Language Selection

English French German Italian Portuguese Spanish

This Week's Movies: The Jacket and The Pacifier

Filed under
Movies
Reviews
-s

The Pacifier staring Vin Diesel was your basic Disney feel good movie. Formulaic, by-the-numbers plot and unimaginative cookie cutter script are dressed up by an admirable performance from my favorite action hero and yours, Vin Diesel. I was hoping he'd get a chance to show his acting ability, but we only saw glimpses as again the writers didn't get much passed his physique and action hero stereotype. It's your basic fish-outta-watern overcome-adversity and
grow-from-it happy-ending movie.

Diesel plays a rough and ready Navy Seal assigned to protect the children and find an important computer program of the assassinated scientist. To do this he must pose as a "babysitter". Along the way, he learns to appreciate the family unit, changes the bratty behavior of the children to loving and respectful, and ends up saving the day.

It was an enjoyable flick, but don't expect to see any Oscar nominations for it. It was worth the price of admission to watch Vin Diesel for an hour and half. Also staring is Faith Ford and
Carol Kane.


The Jacket was a strange movie that puzzled the audience throughout and didn't give any answers in the end. Jack is a soldier wounded in the Gulf War, and finds himself convicted of a murder he didn't commit. Thrown into a psychiatric hospital for the criminally insane, he undergoes some isolation/sensory deprivation treatment. During these treatments he is able to piece together parts of his missing past to remember how the murder occurred. But thing began to get freaky from there. He soon begins traveling forward in time and getting little pieces of information he uses to enrich the life of a couple children. Unfortunately he also learns how and when he was to die. And so he did.

It had an intriguing plot with engaging dialogue. The actors did a marvelous job of portraying their characters. They made an unbelievable scenario plausible. Relative newcomers Adrien Brody and Keira Knightley did a wonderful job and I bet we'll be seeing them again. Old veterans Kris Kristofferson, Jennifer Jason Leigh, and Kelly Lynch were superb in their supporting roles. We are never given a reasonable theory as to how a man supposedly killed in action seems to come back to life and most perplexing how he is able to time travel secured in a straight jacket inside a morgue drawer. It's reminiscent of Jacob's Ladder in its unanswered mystery, the kind of movie one might want to see a few times and even spend time contemplating. This is definitely an unrated winner. I enjoyed this strange psychological mystery immensely.

More in Tux Machines

Security Leftovers

  • Researchers find Android design defects that allow attacks

    The researchers — Yanick Fratantonio of the University of California, and Chenxiong Qian, Simon Pak Ho Chung and Wenke Lee, all from the Georgia Institute of Technology — called it a Cloak and Dagger attack as it happened without the owner of the smartphone being aware that any attack had taken place.

    The attack does not exploit any vulnerability, but takes advantage of two permissions that are allowed for apps to use certain features on Android.

  • The internet of unreliable and broken things
    Fine, the current process is rocky. Some of that is that it’s not matured yet (Alexa, when did Vincent Price die? No, not “play vincent price die”, not “christ die”, not “do you speak some price dead”, you stupid pile of undocumented microchips!) Some of it is that basically every large company underestimates how much people’s accounts are set up incorrectly or incompletely; after all, employees have everything set up right, because they know what they’re doing, and so this never comes up in testing. Some of it is because I’m joining dots on three or four very different puzzles: I’m sure if I were to get a Google Home and use Google Mail to send my shopping list to Google Keep and then buy things from Google Shopping, or if I were to get some theoretical Home Siri device and play music from my Apple account and put things in my Apple iCloud account… then all this would be a lot more seamless. But you should beware people who proclaim that technology would be easy if all us heathens were just to renounce our diverse needs and join their true faith. Mastery goes to the designer who can cope with us real people, in all our glittering and varied patterns and colours and desires. Not just the ones who take the easy way out and block you if you haven’t already bought all the rest of your stuff from them too.
  • 9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
    Datasets from the recent Verizon 2017 Data Breach Investigations Report (DBIR) show that some security teams still may be operating under false assumptions regarding what it takes to keep their organizations secure. For starters, the same security standards don't apply across all vertical industries, says Suzanne Widup, a senior consultant for the Verizon RISK Team and co-author of the Verizon DBIR.
  • “Yahoobleed” flaw leaked private e-mail attachments and credentials
  • Web Developer Security Checklist
    If you have drunk the MVP cool-aid and believe that you can create a product in one month that is both valuable and secure — think twice before you launch your “proto-product”. After you review the checklist below, acknowledge that you are skipping many of these critical security issues. At the very minimum, be honest with your potential users and let them know that you don’t have a complete product yet and are offering a prototype without full security.
  • Obstacles to the Adoption of Secure Communication Tools

    [...] we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools

  • VMware Patches Multiple Security Issues in Workstation
    VMware fixed two bugs in its VMware Workstation late Thursday night, including an insecure library loading vulnerability and a NULL pointer dereference vulnerability. The virtualization software company warned of the issues Thursday night in a security advisory VMSA-2017-0009.

Linux Devices, Tizen, and Android

Peppermint 8 Linux OS Released, It's Based on Ubuntu 16.04.2 LTS with Linux 4.8

Mark Greaves of the Peppermint development team was proud to announce today the release and immediate availability of the Peppermint 8 GNU/Linux distribution. Based on the Ubuntu 16.04.2 LTS (Xenial Xerus) operating system and the HWE (hardware enablement) Linux 4.8 kernel and graphics stacks from Ubuntu 16.10 (Yakkety Yak), which includes the X.Org Server 1.19 and Mesa 17.0.2 packages, Peppermint 8 is here in its final, production-ready state to conquer your personal computers with a highly customized MATE desktop environment. Read more

Security Leftovers: Russian Critic, NTFS Chaos, CentOS Patches, and British Airways Grounded