CAN ANYONE EXPLAIN TO ME HOW HACKERS USE MIRRORS OR REMOTE SERVERS AND STAY ANONYMOUS AND UNTRACEBLE ?? sometimes it is shown in variuos hollywood movies that a certain hacker is using such a system due to which he is untraceble. Is it true that such system exits? if yes then please explain me how does they work.