Proxies are used so that the "hacker" can remain anonymous. Once a user connects to a proxy, the source traffic all appears to be coming from the proxy servers IP address, therefor it becomes more...