Definitions

Sorry, no definitions found. You may find more data at scarfo.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word Scarfo.

Examples

  • Scarfo is still in prison, elegible for release in 2033 (when he will be 104).

    Family Ties in Irving, TX « Skid Roche 2008

  • Scarfo is still in prison, elegible for release in 2033 (when he will be 104).

    Family Ties in Irving, TX « Skid Roche 2008

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

  • The logger recorded the decrypting key — or, more precisely, the passphrase Scarfo used to generate that key — as he typed it in, and gained access to his incriminating files.

    Homeland Insecurity 2002

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.