Find the word definition

WordNet
custom-make

v. make to specifications; "I had this desk custom-made for me" [syn: customize, customise, tailor-make]

Usage examples of "custom-make".

The girl was custom-made to appeal to a man of varied tastes, and Negara was still that, even at seventy.

Her daughter was married to the governor and the Oatman Family Gospel Singers were doing so well they had just purchased another brand-new Silver Eagle custom-made Trailways bus and had a new hit album.

There would also be a custom-made system of bioengineered organs that would synthesize nutrients from the Jovian atmosphere to support that part.

In his price bracket, the feelie was custom-made to his exact requirements.

He moved away from the wall and paced four steps across the lobby, his footsteps muffled in the plushness of the custom-made carpet.

I said as I pulled the custom-made felt cover off the old Wurlitzer jukebox and, with a flourish, dropped the cloth over the planter and into the empty front booth.

His weaponry included the famous SATAN program (the Security Administer Tool for Analyzing Networks, used by both sysadmins and hackers to check the "hackability" of computer networks), several breaking and entering programs that would let him grab root access on various types of machines and networks, a custom-made Web browser and newsreader, a cloaking program to hide his presence while he was in someone else's computer and which would delete traces of his activities when he logged off, sniffer programs that would "sniff out" - find - user-names, passwords and other helpful information on the Net or in someone's computer, a communications program to send that data back to him, encryption programs and lists of hacker Web sites and anonymizer sites (commercial services that would in effect "launder" e-mails and messages so that the recipient couldn't trace Gillette).

His weaponry included the famous SATAN program (the Security Administer Tool for Analyzing Networks, used by both sysadmins and hackers to check the “hackability” of computer networks), several breaking and entering programs that would let him grab root access on various types of machines and networks, a custom-made Web browser and newsreader, a cloaking program to hide his presence while he was in someone else’s computer and which would delete traces of his activities when he logged off, sniffer programs that would “sniff out” – find – user-names, passwords and other helpful information on the Net or in someone’s computer, a communications program to send that data back to him, encryption programs and lists of hacker Web sites and anonymizer sites (commercial services that would in effect “launder” e-mails and messages so that the recipient couldn’t trace Gillette).

She had taken nun to a modern-looking apartment Its windows overlooked a street crowded with shops selling cheap electronics, secondhand cameras (most of them probably stolen), and custom-made ao dais.

Unlike Tremont, who was dressed in custom-made chinos, pewter-colored bush shirt, Gore-Tex lined safari jacket, and a broad-brimmed safari hat that hung from its chin strap down his back, they wore expensive, tailored business suits.

So an expensive custom-made chastity belt had to have some other reason.

He wore a dark grey suit from Fioravanti, a custom-made shirt from Kabbaz, a Racquet-club tie and black wing-tips by Vogel.

Custom-made, state-of-the-art data encryption systems, combined with the threat of dire conse­.

His neatly trimmed hair, custom-made white shirt, striped silk tie, hand-tailored double-breasted suit, and thin-soled calfskin shoes were in keeping with his occupation as a highly paid, corporate executive.

What made Carmine hate the men who had perished in their custom-made gas chamber was easy to see.