Bet Raise Fold
The Story of Online Poker

Show More

Related videos

What Made Me Stop Drinking: Four Stories
An intimate and revealing look into the lives of four people who are addicted to alcohol. Four very different individuals tell their stories ... a lawyer who wanted to stop his kids from being afraid of him; a first nations man, who wanted the pain of belonging to an underprivileged…
How I Stopped Drinking: Four Stories Continued
A follow-up to What Made Me Stop Drinking, this program investigates how those same people - recovering alcoholics - actually managed to stop drinking. They took different routes and found their own sources of support. Mandy - "I hated my life, I hated myself. I hated everybody I knew and…
Grinders - The Underground World of Illegal Poker
With a new baby and wife to support, out-of-work filmmaker Matt Gallagher tries his hand - and some would say "luck"- at playing poker for a living. This inside journey into the unconventional, often bizarre, underground world of illegal poker clubs finds a world populated by colourful characters, straight out…
I Dream of Wires
I Dream of Wires is a documentary about the rise, fall and rebirth of the machine that shaped electronic music: the modular synthesizer. The film explores the synthesizer's remarkable history, revealing how innovators like Robert Moog, working at Columbia University's Computer Music Center, helped built the foundation for the machine.…
Captivated - Finding Freedom in a Media Captive Culture
Captivated features insights from media experts as well as personal stories from individuals and families who have escaped media addiction and learned to make discerning and God-honoring choices about their use of media technology.
Stuxnet—The First Cyber Guided Missile
Your introduction to the fascinating--and fascinatingly dangerous--world of cybersecurity begins with the story of "Stuxnet." Learn how this unique piece of malware, which shut down a uranium enrichment facility in Iran, signaled the dawn of a new age in which viruses and other cyber threats can manipulate the physical world.
The Incredible Scope of Cyberspace
What makes the Internet so vulnerable is its ability to connect, and to be connected to, anyone and almost anything. Here, explore how cyberspace works. You'll learn what goes on behind the scenes of a simple Internet search, how a simple TCP/IP system functions, the five layers of connections that…
The Five Gateways of Internet Vulnerability
Take a closer look at the cyber domain's inherent vulnerability to cyber threats. Professor Rosenzweig explains the five key gateways to this vulnerability, including the Internet's ability to destroy time and space; allow users to act in ways they can't in the physical world; and operate without international boundaries.
Of Viruses, Botnets, and Logic Bombs
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture…
The Problem of Identity on the Network
Identification is perhaps the single most profound challenge for cybersecurity today. In this episode, delve into the question of network anonymity and identity. Who maintains domain names? How can people obscure their identities for malicious purposes? How are network designers fighting back against this threat? What are the ethical problems…
Cyber Fraud, Theft, and Organized Crime
Professor Rosenzweig leads you on an examination of all-too-common instances of cybercrime that involve fraud and identity theft. You'll encounter crimes that mimic real-world ones (with a computer as the "weapon") and "computer crimes" that are only possible in the cyber world. Then, find out how law enforcement authorities are…
Hacktivists and Insurgency
Enter the netherworld of hacktivism, or the use of computer hacking methods to stage protests and make political statements. In this episode, learn to identify and distinguish the "good guys" from the "bad guys" by exploring real-world examples that illustrate the three major types of hacktivists: political activists, cyber insurgents,…