Used by crackers who dial up to the Internet hoping to find connections left dangling when somebody else abruptly hung up. They can then exploit the connections. The term is also used to describe the activity of hunting for Residual Data on erased devices. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.