SECURITY THROUGH DATA

CYBER 101

  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Entertainment
  • FAQ

Cyber Risks

  • Alerts
  • Attackers
  • Incidents
  • Threats

Cyber Education

  • Books
  • Certifications
  • Courses
  • Definitions
  • Documents
  • Domains
  • Quotes
  • Tutorials
  • Trivia
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
  • Home
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
No Result
View All Result
  • About
    • Company
    • Legal and Privacy Policy
CyberMaterial
No Result
View All Result

Gamer (2009)

1 min read
in College Students, Cyber Citizens, Entertainment, Movie

In a future mind-controlling game, death row convicts are forced to battle in a ‘Doom’-type environment. Convict Kable, controlled by Simon, a skilled teenage gamer, must survive thirty sessions in order to be set free.

Each week Kable (Gerard Butler), a death-row inmate, battles his fellow prisoners in a violent online game called “Slayers,” his every move controlled by a young gamer’s remote device. To the players, Kable and the other inmates are just simulated characters. But, to a resistance group that opposes the game’s inventor, Kable is a critical component of their plan to end the inventor’s form of high-tech slavery.

 

Rating 5.8 IMDb
Available Available on most platforms
Country of origin USA


Watch Trailer:

Related

Tags: 2000College Students EntertainmentCyber CitizensCyber ProfessionalsCyber Professionals EntertainmentGamerMovies
4
VIEWS
ADVERTISEMENT

Related Posts

6 Books about Cryptography

6 Books about Cryptography

May 24, 2022
Practical Cryptography in Python: Learning Correct Cryptography by Example

Practical Cryptography in Python: Learning Correct Cryptography by Example

May 24, 2022
Understanding Cryptography: A Textbook for Students and Practitioners

Understanding Cryptography: A Textbook for Students and Practitioners

May 24, 2022
Real-World Cryptography

Real-World Cryptography

May 24, 2022

More Articles

A stakeholder-oriented security analysis in virtualized 5G networks

April 5, 2021
Quotes

“The quantum threat is basically…”

December 12, 2020

Israeli hospital cancels non-urgent procedures following ransomware attack

October 14, 2021

Hacking Exposed Linux, 3rd Edition

November 7, 2020

Ecuador’s Banco Pichincha has yet to recover after recent cyberattack

October 18, 2021
Alerts

Microsoft Releases November 2021 Security Updates

November 9, 2021
Course

SOC Analyst Training with Hands-on to SIEM from Scratch

March 17, 2022

Sensity Detection API (1.0)

November 30, 2020
Load More
ADVERTISEMENT

© 2022 | CyberMaterial | All rights reserved.

  • About us
  • Contact
  • Legal and Privacy Policy
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Incidents
  • Cyber Education
    • Book
    • Certification
    • Course
    • Definition
    • Document
    • Quotes
    • Tutorials
  • Cyber Opportunities

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Posting....