Language Selection

English French German Italian Portuguese Spanish

Tech That Tried to Kill Us!

Filed under
Movies
Humor

For Halloween, we've rounded up the ways horror has tried to use tech to kill us. Text messages from the dead, TV waves that destroy your brain, even evil EVP. The bottom line is that true creep factor is a well-written plot, expertly paced scenes and deeply disturbing imagery -- not a possessed iPad or rogue radio.

White Noise (2005)

Good news, guys: we've found Michael Keaton! It's been years since he donned the Batsuit or got Jack Frosted, but that's because he's been spending his time tuned into the radio waves, attempting to locate his dead wife. But some cranky ghosts are upset that Mikey's been prying into their private time. What Keaton believes are his wife's plaintive cries are actually impassioned warnings against playing with the afterlife (and were painfully obvious to all of us).

Pulse (2006)

Kristen Bell is Mattie, a normal college student with normal boyfriend problems. Well, mostly. He's been MIA for a week, and keeps calling and hanging up. But, really, he's unlocked a portal to the realm of the life-sucking dead through his extra-curricular hacking, and has wound up killing himself.

full story




More in Tux Machines

Today in Techrights

Leftovers: OSS

  • Are Low-Code Platforms a Good Fit for Feds?
    Open-source code platforms — in part, because they’re often free — have long been a popular choice for digital service creation and maintenance. In recent years, however, some agencies have turned to low-code solutions for intuitive visual features such as drag-and-drop design functionality. As Forrester Research notes, low-code platforms are "application platforms that accelerate app delivery by dramatically reducing the amount of hand-coding required."
  • Crunchy Data Brings Enterprise Open Source POSTGRESQL To U.S. Government With New DISA Security Technical Implementation Guide
    Crunchy Data — a leading provider of trusted open source PostgreSQL and enterprise PostgreSQL technology, support and training — is pleased to announce the publication of a PostgreSQL Security Technical Implementation Guide (STIG) by the U.S. Department of Defense (DoD), making PostgreSQL the first open source database with a STIG. Crunchy Data collaborated with the Defense Information Systems Agency (DISA) to evaluate open source PostgreSQL against the DoD's security requirements and developed the guide to define how open source PostgreSQL can be deployed and configured to meet security requirements for government systems.
  • Democratizing IoT design with open source development boards and communities
    The Internet of Things (IoT) is at the heart of what the World Economic Forum has identified as the Fourth Industrial Revolution, an economic, technical, and cultural transformation that combines the physical, digital, and biological worlds. It is driven by such technologies as ubiquitous connectivity, big data, analytics and the cloud.

Software and today's howtos

Security and Bugs

  • Security updates for Thursday
  • Devops embraces security measures to build safer software
    Devops isn’t simply transforming how developers and operations work together to deliver better software faster, it is also changing how developers view application security. A recent survey from software automation and security company Sonatype found that devops teams are increasingly adopting security automation to create better and safer software.
  • This Xfce Bug Is Wrecking Users’ Monitors
    The Xfce desktop environment for Linux may be fast and flexible — but it’s currently affected by a very serious flaw. Users of this lightweight alternative to GNOME and KDE have reported that the choice of default wallpaper in Xfce is causing damaging to laptop displays and LCD monitors. And there’s damning photographic evidence to back the claims up.