Guys., being in the IT security field there are number of methods to spoof and work. One of the famous techniques include Onion Routing Techniques. A working implementation called TOR does exist and methods like proxy chaining and TOR chaining will make a hacker completely undetected and completely untraceable.