#!/bin/perl
# 
# Dear Client,
#   You might be wondering what this program is doing in your cgi-bin
# directory. The original "phf" program is a standard example program
# that is distributed along with a number of common webservers. Unfortunately,
# it has a bug in that when passed the correct parameters, it can be used
# to retrieve sensitive system files from the host machine. We have noticed
# a large number of would-be hackers on the net who attempt to use this
# program to gain illegal access to our systems.
#   Thus, we have written our own special program that records these
# break-in attempts and helps us in tracking the culprits. This bogus
# "phf" program here on your server merely redirects any hacking 
# attempts to our notice. We ask that your simply leave this program alone:
# do not modify it or attempt to run it, lest we mistake your curiosity
# for a genuine break-in attempt.
#
# Thank you for your understanding,
#   AIT Systems Support

$server = $ENV{'SERVER_NAME'};
$query = $ENV{'QUERY_STRING'};
$query .= '%%'.$server;

print "Location: ",
      "http://www.aitcom.net/cgi-bin/phf",
      "\?",$query,"\n\n";
