Browse Definitions :
Definition

grawlix

A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase. Here's an example of a typical grawlix:

#@$%*!

The term first appeared in a 1964 article called Let's get down to grawlixes by American cartoonist Mort Walker, who is best known as the creator of the Beetle Bailey and Hi and Lois cartoons. Later, in a book called The Lexicon of Comicana, Walker created and named an international set of symbols used in comics around the world. Walker called his system Symbolia.

Here are some examples of other terms in the list:

  • agitrons: wiggly lines indicating that something is shaking
  • briffits: clouds of dust indicating that a character left in a rush
  • emanata: straight lines rising from around a character's head indicating surprise
  • plewds: drops of sweat indicating that a character is hot or stressed
  • squeans: asterisks with an empty center indicating drunkenness or dizziness
  • waftaroms: wavy lines rising from something indicating a strong smell or heat.

Some of the symbols used in Symbolia, such as the squean, are not represented on a keyboard or in commonly-used fonts. Some comic-oriented fonts, such as MarkerMan, include Symbolia characters.

This was last updated in June 2010

Continue Reading About grawlix

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close