D. Corinto and T. , free computing' to describe the participatory and non-institutional usage of information and communication technologies. The notion is loosely inspired by that of 'autonomous technology As such, it is closer to the political context of the early 1980s and less prone to anachronism than the notions of 'free' or 'open' computing (Raymond, 1998). 5. Although their existence was attested in the 1970s, it was only in the following decade that electronic viruses started to be perceived as an actual danger by the software engineering community. The first scientific article analysing and defining them is Cohen, 1984.

. Sloan-kettering, Cancer Center was infiltrated by the members of the '414 gang', a hacker collective from Milwaukee Probably performed by mistake and promptly interrupted, the access was depicted in sinister tones in media reports In this case, the system administrators at the Sloan-Kettering Cancer Center solved the problem by simply sending the hackers a message asking them to stop their jokes ? which they did immediately, There was no damage to the system. 8. For a complete reconstruction see Mungo and Glough, 1992.

J. L. Popp, American addresses were targeted and the diskette's licence agreement formally banned distribution and use of the software in the US. See Anon, 1989.

K. Cummings and . Kraut, One of the milestones in Apple's rise to commercial supremacy was a computer christened Lisa, named after Steve Job's daughter In the 1980s, another big hitter was Commodore's Vic20, whose name, according to its creator, 'sounded like a truck driver 12 Among the best-known examples of computer names inspired by childhood are: the IBM PC jr, the Japanese Junior100 and the Danish RC Piccolo Animal and fruit names were also commercially successful: for example, the Commodore's Pet was followed by BWV's Husky and by Applied Technologies' MicroBee; early European competitors of Apple included Acorn computers and Apricot PC. 13. After 1982, a number of short-lived home computers with pretentious names popped up: the Welsh Dragon Data, the English Atom, the Belgian Charlemagne 999, the French Orchidée as well as the American Vixen were all forced out of the market by 1984. 14. For a complete description see Linzmayer (1999) and Friedman 15. 'Rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought We exist without skin color, without nationality, without religious bias ... and you call us criminals. [ . . . ] My crime is that of judging people by what they say and think, not what they look like'. (The Mentor, 1986). 16. Now established as a landmark publication in hacker history, Die Datenschleuder: Das wissenschaftliche Fachblatt fu¨r Datenreisende [The Data Catapult: A scientific journal for Infonauts] was initially published as a xeroxed newsletter by the Chaos Computer Club (CCC) This historical collective of anarchist and autonomen computer activists first made international news in 1984, when the German computer network Bildschirmtext was hacked. CCC members managed to withdraw a large sum of money from a Hamburg bank. Along with typical hacker bravado, the CCC founders displayed a certain 'gentlemen Marxist thieves' integrity: the money was soon returned and the act remained simply a bold commentary on the financial system's greed. 17. The phrase 18. The founder of Aids Treatment News The director of Critical Path, was also the initiator of the seminal Bay Area 'virtual community' CommuniTree (Stone Kiyoshi Kuromiya , was a top name in the electronic activist milieu of Philadelphia, 1990.

P. Abrahams, Corporate Security: High-Tech Hits the Old Guard', Financial Times, 1988.

I. Ang, Watching Dallas: Soap Opera and the Melodramatic Imagination, 1985.

. Anon, TI99/4A: L'Ordinateur Familial', picture in Tilt 3, p.23, 1983.

. Anon, Donnez-lui votre rythme cardiaque et votre age, il vous donnera la forme, 1983.

. Anon, Die Bratenschleuder: Gastrokybernetische Appetithappen', picture in Die Datenschleuder 17, p.13, 1986.

. Anon, Viromat Plus', picture in Die Datenschleuder 15, p.17, 1986.

. Anon, No Title', picture in Die Datenschleuder, vol.19, p.1, 1987.

. Anon, No Title', picture in Die Datenschleuder, pp.28-37, 1988.

. Anon and J. Popp, Licence Agreement ? AIDS Information Introductory Disk'. Brochure, 1989.

C. Babiole, Les Re´alite´s virtuelles, documentary film, 1992.

A. Baecque and . De, Le Corps de l'histoire: metaphores et politique, pp.1770-1800, 1993.

B. Bagnall, Commodore ? Vic20', Old Computers, 2003.

J. P. Barlow, Being in Nothingness: Virtual Reality and the Pioneers of Cyberspace, pp.34-43, 1990.

D. J. Bell, Cyberculture Theorists: Manuel Castells and Donna Haraway Cyberculture: The Key Concepts, 2004.
DOI : 10.4324/9780203357019

J. Berthelot, Du corps comme op??rateur discursif ou les apories d???une sociologie du corps, Sociologie et soci??t??s, vol.24, issue.1, pp.11-18, 1992.
DOI : 10.7202/001061ar

B. Bradley, Non-techies'' Could Be Hurt by VirusNo Bail in Virus Blackmail Case', The Guardian 3, Christian Science Monitor, vol.80, issue.118, 1988.

A. Burguière, Anthropologie historique et l'E ´ cole des Annales, Les Cahiers du Centre de Recherches Historiques, 1999.

P. Burke, Strengths and weaknesses of the history of mentalities, History of European Ideas, vol.7, issue.5, pp.439-51, 1986.
DOI : 10.1016/0191-6599(86)90120-8

A. A. Casilli, Le st??thoscope et la souris??: savoirs m??dicaux et imaginaires num??riques du corps, Esprit, vol.Mars/avril, issue.3, pp.175-88, 2009.
DOI : 10.3917/espri.0903.0175

URL : http://www.cairn.info/load_pdf.php?ID_ARTICLE=ESPRI_0903_0175

R. Chartier, Au bord de la falaise: l'histoire entre certitudes et inquietude, 1998.

F. B. Cohen, Computer viruses, in Proceedings of the 7th DoD/NBS Computer Security Conference, pp.240-63, 1984.
DOI : 10.1016/0167-4048(87)90122-2

S. Connor, Doctor Popp and the Trojan Horse', The Independent 1, 1991.

M. Cooper, Pre-empting Emergence: The Biological Turn in the War on Terror, Theory, Culture & Society, vol.23, issue.4, pp.113-148, 2006.
DOI : 10.1177/0263276406065121

J. N. Cummings and R. Kraut, Domesticating Computers and the Internet, The Information Society, vol.8, issue.3, pp.221-252, 2002.
DOI : 10.1145/3532.3537

D. Certeau and M. , Ecriture de l'histoire, 1975.

C. Detrez, La Construction sociale du corps, 2002.
URL : https://hal.archives-ouvertes.fr/halshs-00425852

D. Corinto, A. , and T. Tozzi, Hacktivism: lalibertà nelle maglie della rete, 2002.

N. Dyer-witheford, Autonomist Marxism and the Information Society, Capital & Class, vol.52, pp.85-125, 1994.

S. Epstein, The Construction of Lay Expertise: AIDS Activism and the Forging of Credibility in the Reform of Clinical Trials, Science, Technology & Human Values, vol.20, issue.4, pp.408-445, 1995.
DOI : 10.1177/016224399502000402

S. Epstein, Impure Science: AIDS, Activism, and the Politics of Knowledge, 1996.

N. Fairclough, Analysing Discourse: Textual Analysis for Social Research, 2003.

M. Featherstone, Ubiquitous Media, Theory, Culture & Society, vol.15, issue.3, pp.319-341, 2007.
DOI : 10.1177/0263276409103104

A. Fraiberg, Of AIDS, Cyborgs, and Other Indiscretions: Resurfacing the Body in the Postmodern, Postmodern Culture, vol.1, issue.3, 1991.
DOI : 10.1353/pmc.1991.0013

T. Friedman, D. Frohlich, and R. Kraut, Electric Dreams: Computers in American CultureThe Social Context of Home Computing, Inside the Smart Home: Ideas, Possibilities and Methods, pp.127-62, 2003.

J. Geary, The Body Electric: An Anatomy of the New Bionic Senses, 2002.

W. Gibson, Spook Country, 2007.

J. Gillett, Media activism and Internet use by people with HIV/AIDS, Sociology of Health and Illness, vol.6, issue.4, pp.608-632, 2003.
DOI : 10.1111/1467-9566.00254

T. W. Grundner and R. E. Garrett, Interactive Medical Telecomputing, New England Journal of Medicine, vol.314, issue.15, pp.982-987, 1986.
DOI : 10.1056/NEJM198604103141508

J. M. Hamilton, Sun's Big Burst into Virtual Reality', Business Week Online 6 February, Bodies in Code: Interfaces with New Media, 1998.

D. J. Haraway, A Cyborg Manifesto, Socialist Review, vol.15, issue.2, pp.424-57, 1985.
DOI : 10.5749/minnesota/9780816650477.003.0001

D. Haraway, The Biopolitics of Postmodern Bodies: Determinations of Self in Immune Systems Discourse, Journal of Feminist Cultural Studies, vol.1, issue.1, pp.3-43, 1989.

M. Harrison, Security Gets Intensive Care: Medical Groups Step Up Protection', Financial Post, 1988.

N. K. Hayles, RFID: Human Agency and Meaning in Information-intensive Environments', Theory, Culture & Society, vol.26, pp.2-3, 2009.
DOI : 10.1177/0263276409103107

C. Ikegami, HIV Prevention and Community-Based Organizations in Japan, Journal of Acquired Immune Deficiency Syndromes and Human Retrovirology, vol.14, issue.2, pp.51-58, 1997.
DOI : 10.1097/00042560-199700002-00010

J. S. James, AIDS Computer Conference from Stockholm, Aids Treatment News, vol.57, 1988.

J. S. James, Scientific Justification for Community-based Trials, Aids Treatment News, vol.65, 1988.

D. Kalifa, What Is Now Cultural History About Writing Contemporary History, pp.47-56, 2008.

B. Kocher, President's letter, Communications of the ACM, vol.32, issue.1, pp.3-6, 1989.
DOI : 10.1145/63238.315910

K. Knorr-cetina and A. Preda, The Temporalization of Financial Markets: From Network to Flow', Theory, Culture & Society, vol.24, pp.7-8, 2007.

S. Krishnamurthy, Contemporary Research in E-marketing, 2004.

L. Breton and D. , Adieu au corps, 1999.

P. Lévy, L'intelligence collective: pour une anthropologie du cyberspace Apple Confidential: The Real Story of Apple Computer Inc, 1994.

D. Lupton, Moral Threat and Dangerous Desires: AIDS in the News Media, 1994.

D. N. Mccloskey, Thick and Thin Methodologies in the History of Economic Thought The Popperian Legacy in Economics, pp.245-58, 1988.

T. Mentor, Hacker Manifesto: The Conscience of a Hacker, URL, 1986.

H. Moravec, Mind Children: The Future of Robot and Human Intelligence, 1988.

P. Mungo and B. Glough, Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals, 1992.

J. Murche, Rogue Disks Hit Computers', The Advertiser 15, 1989.

A. Muri, Of Shit and the Soul: Tropes of Cybernetic Disembodiment in Contemporary Culture, Body & Society, vol.2, issue.1, pp.73-92, 2003.
DOI : 10.1177/1357034X030093005

A. K. Naj, Virtual Reality Isn't a Fantasy for Surgeons, Wall Street Journal, vol.3, 1993.

A. Painter, Viral Politics: The Power of E-campaigning, 2002.

P. J. Pane, Man Arrested in AIDS Disk Blackmail SchemeHackers Could Identify IVF Dads', The Herald 23, 1988.

P. Poirrier, Histoire culturelle: un tournant mondial dans l'historiographie? Dijon: E ´ ditions, 2008.

E. S. Raymond, Homesteading the Noosphere, First Monday, vol.3, issue.10, p.542, 1998.
DOI : 10.5210/fm.v3i10.621

H. Rheingold, The Virtual Community: Homesteading on the Electronic Frontier, 1993.

L. Richards, The Appearance of Youthful Subculture: A Theoretical Perspective on Deviance, Clothing and Textiles Research Journal, vol.6, issue.3, pp.56-64, 1988.
DOI : 10.1177/0887302X8800600308

S. Richman, Common Sense Helps in Virus Battle, 1989.

S. Rodgers, Medical Files Easy Prey to Hackers', Courier-Mail 23, 1985.

L. B. Rosenberg, Medical Applications of Virtual Reality, Virtual Reality Systems, vol.1, issue.3, pp.48-50, 1994.

D. J. Ross, Persons, Programs and Uploading Consciousness, Extropy, vol.9, pp.12-16, 1992.

R. M. Satava, Virtual Reality and the New World Order of Medicine, Virtual Reality Systems, vol.1, issue.3, p.6, 1994.

R. Scott, 1984: Apple MacIntosh', TV commercial by, 1984.

L. Singer, Erotic Welfare: Sexual Theory and Politics in the Age of Epidemic, 1993.

B. Sterling, Introduction to Mirrorshades Mirrorshades: The Cyberpunk Anthology, pp.1-13, 1986.

J. Sterne, The Historiography of Cyberculture, Critical Cyberculture Studies, pp.17-28, 2006.

A. R. Stone, Will the Real Body Please Stand Up? Boundary Stories about Virtual Cultures Cyberspace: First Steps, pp.81-118, 1991.

A. R. Stone, The War of Desire and Technology at the Close of the Mechanical Age, 1996.

J. Storey, CulturalTheory and Popular Culture: An Introduction, 2006.

P. A. Treichler, How to Have Theory in an Epidemic, pp.57-106, 1991.
DOI : 10.1215/9780822396963-009

B. S. Turner, Medical Power and Social Knowledge, 1987.

J. Van-loon, Risk and Technological Culture: Towards a Sociology of Virulence, 2002.
DOI : 10.4324/9780203466384

C. Venn, R. Boyne, J. Phillips, and R. Bishop, Technics, Media, Teleology: Interview with Bernard Stiegler, Theory, Culture & Society, vol.24, issue.7-8, pp.7-8, 2007.
DOI : 10.1177/0263276407086403

G. Vigarello, Une Histoire culturelle du sport: techniques d'hier et d'aujourd'hui, 1988.

C. Waldby, AIDS and the Body Politic: Biomedicine and Sexual Difference, 1996.

C. Wilder, Cashing in on Virus Anxieties, Computerworld, vol.21, 1988.

R. Wodak, The Discourse-historical Approach Methods of Critical Discourse Analysis, pp.63-94, 2001.

C. Wood, Crime in the Computer Age', Maclean's 25, 1988.

W. Woods, Computer Guardian: The Sensation of a Shared Virtual Reality', The Guardian 13, 1989.

A. Antonio and . Casilli, His research interests include the social use of ICT, with a focus on health and computer-mediated communication. Among his publications are: Les Liaisons nume´riques He also authors the blog Bodyspacesociety, Stop Mobbing (DeriveApprodi, 2001) and La fabbrica libertina (Manifesto Libri, 1997.