Language Selection

English French German Italian Portuguese Spanish

This Week At the Movies: Boogeyman & Alone in the Dark & Hide and Seek

Filed under
Movies
Reviews
-s

Boogeyman: Watching Boogeyman was a phenomenally scary thrill ride. I had goosebumps within the first five minutes. It takes place mostly at night, but even the day shots had an atmosphere of dark foreboding. Off kilter camera angles, eerie and sudden sound effects, dark atmosphere, and scaling camera effects of director Stephen Kay make this lower budget

movie worth a watch. The script by Eric Kripke, Juliet Snowden, Stiles White, and Darren Lemke may not win any Academy Awards, but it sure keeps you on the edge of your seat and at times jumping out of it! It was definitely scary. However there seemed to be too much build up and not quite enough meat. It presented but didn't seem to answer too many questions. This leaves the audience not quite prepared for the climax, which is a slight let down as far as showdowns go. The acting by Barry Watson was convincing and believable. The audience could feel his fear right along with him. With his boy-next-door good looks, one might expect to see more from this relative newcomer. All and all, I'd recommend this flick.

Alone in the Dark: This flick is definitely wait-for-cable, and only if nothing else is on. I don't know what was worse: the acting, the script, or the plot! Christain Slater was the only bright spot in the whole project, but even a well trained and experienced actor couldn't overcome the lame script to carry the whole film. Stephen Dorff was forgettable and Tara Reid couldn't act her way out of a speeding ticket. The special effects were unconvincing and down right boring. Even the obligatory sex scene was a just a chance to refill the popcorn bowl. Shooowee! Don't waste your money or time on this stinker!

Hide and Seek: Hide and Seek is a quality Hollywood film starring Robert DeNiro and Dakota Fanning. Excellent script, classic direction, and wonderful performances make this flick a must see. The suspenseful plot surrounds around a little girl, her father and her new imaginary friend. After more than one alarming occurrence, the audience begins to get an inkling that perhaps the friend isn't quite so imaginary. It's a first rate psychological thriller, not entirely predictable but maybe a little formulaic. I recommend you try to catch this one.

Good Movie Reviews

Good movie reviews. Keep them coming.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security Leftovers

  • Tencent admits to poisoned QR code attack on QQ account
  • Sysdig Adds Ability to Make Container Runtimes Immutable - Container Journal

    Sysdig today added a Drift Control capability to its container security platform that makes it possible to lock down runtime environments. Daniella Pontes, senior manager for product marketing at Sysdig, says IT teams can now maintain immutable instances of runtimes in production environments that can’t be modified. At the same time, Sysdig says it is partnering with Proofpoint to make threat intelligence feeds available to IT teams that have deployed its container security platform. The Sysdig container platform is built on Falco, an open source container runtime security platform that is being advanced under the auspices of the Cloud Native Computing Foundation (CNCF).

  • Best ways to incorporate security into the software development life cycle

    The software development life cycle is not a one-off process that software developers can implement in a linear form. Instead, there are phases of the SDLC that intertwine into many loops where thorough checks are carried out to ensure the proper outcome of the software. However, it’s not just enough to loop through the phases of SDLC without the proper integration of security checks in each phase. So, what, then, makes a secure software development life cycle?

  • CISA Says 'PwnKit' Linux Vulnerability Exploited in Attacks [Ed: Well, CISA and the media also downplay all the actively-exploited holes in Windows]

    The US Cybersecurity and Infrastructure Security Agency (CISA) says a Linux vulnerability tracked as CVE-2021-4034 and PwnKit has been exploited in attacks. The flaw, which came to light in January, affects Polkit, a component designed for controlling system-wide privileges in Unix-like operating systems. Polkit is developed by Red Hat, but it’s also used by other Linux distributions. PwnKit has been described as a memory corruption issue that can be exploited for privilege escalation — it allows any unprivileged local user to elevate permissions to root.

Raspberry Pi Restores Guitar Amp, Complete With Effects

Restoring old hardware is always more fun when you can throw in a Raspberry Pi. This project, created by maker and developer David Silverman, does just that, using a Pi to power an old Vox guitar amplifier. Not only does it work as an amplifier, it also has a few special effects thrown in to create custom sounds. This Pi-powered guitar amp system is housed inside the cabinet of an old Vox amplifier that, according to Silverman, is no longer working. A Pi 3B+ brings back the original functionality, with the help of a class D amplifier and some custom Python scripts created by Silverman himself. The case has been modified to house the Pi and features panels with port access, as well as knobs for the effects array. Read more Also: Lilbits: Anbernic Win600 (handheld gaming PC), PineNote (Linux-friendly E Ink tablet), Firefox 102 and Chrome OS 103 - Liliputing

Help others find free software: Watch and share Escape to Freedom

"Escape to Freedom" is a new animated video from the Free Software Foundation (FSF), giving an introduction to the concepts behind software freedom: both what we gain by having it, and what rights are at stake. Join our lead freedom-seeker, Zara, as she learns the importance of free software, and guides herself through the labyrinth of challenges posed to her by contemporary digital society, which offers the tempting allure of convenience in exchange for important rights. In search of freedom, she learns how to seize control of her own seemingly predetermined narrative and helps others do the same -- taking the ladder that leads to digital liberation step by step. Read more

vnlog 1.33 released

This is a minor release to the vnlog toolkit that adds a few convenience options to the vnl-filter tool. Read more