Search Details

Word: scrawling (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

That's the secret, really. Don't write out "TIME!!!" in inch-high scrawl--it only brings out the sadist in us. Don't (Cliffies) write offers to come over and read aloud to us your illegible remarks--we can (officially) read anything, and we may be married. Write on both sides of the page--single bluebook finals look like less work to grade, and win points. This chic, shaded calligraphic script so many are affecting lately is handsome, and is probably worth a good extra five points if you can hack...

Author: By Donald Carswell, | Title: BEATING THE SYSTEM | 5/17/2000 | See Source »

Walk into George W. Bush's office in Austin, Texas, and you can't miss the baseballs. Nearly 250 of them, collected since Bush was a child, fill two wooden cases along one wall. Each prize rests in its plastic cube displaying a superstar's scrawl. In the collection are bygone greats like pitcher Sandy Koufax and today's stars like Ken Griffey Jr. The light-blue signature of the legendary Stan Musial is barely legible on one dingy yellow ball. Most are bright white, though, including the one signed by both rival sluggers Joe DiMaggio and Ted Williams. There...

Author: /time Magazine | Title: Campaign 2000: Diamonds Are for Bush | 5/15/2000 | See Source »

...read your magazine religiously every week - I think it is the best weekly publication at Harvard. That's why I was so upset when I saw last week's issue. Apparently, someone had maliciously vandalized the back cover, using a piece of charcoal to scrawl all over your tasteful portrait of a tree...

Author: NO WRITER ATTRIBUTED | Title: Fifteen Minutes: From Our BULGING Mail Bags | 2/17/2000 | See Source »

When a site has been hacked, its appearance is often altered by chest-beating hackers who leave the cyber equivalent of a "Kilroy was here" scrawl. This week's attacks, on the other hand, bombarded various high-traffic sites with an overflow of information, effectively shutting down normal operations. How do the perpetrators send so much data so quickly? Apparently, the most recent assaults are not typical denial of service pranks, which generally are sent from only one or two computers at a time. "These people scan the Internet for vulnerable systems, and they hack into those systems, and then...

Author: /time Magazine | Title: Classic Hackers Decry Heavy-Handed Upstarts | 2/9/2000 | See Source »

Still, encouraging the arts--even if that meant letting students scrawl with paintbrushes along the walls of the labyrinthine tunnel system--bears fulfilling fruit...

Author: By Scott A. Resnick, CRIMSON STAFF WRITER | Title: The Caped Crusader | 4/12/1999 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | Next