Page Time: 0.0868s

Memory: 10.5818 MB (Peak: 11.7005 MB)

Queries (12, time: 0.0071s, 8.1%)

  1. SELECT data_key, data_value
    FROM xf_data_registry
    WHERE data_key IN ('options', 'languages', 'contentTypes', 'codeEventListeners', 'deferredRun', 'simpleCache', 'addOns', 'defaultStyleProperties', 'routeFiltersIn', 'routeFiltersOut', 'routesPublic', 'nodeTypes', 'bannedIps', 'discouragedIps', 'styles', 'displayStyles', 'userBanners', 'smilies', 'bbCode', 'threadPrefixes', 'userTitleLadder', 'reportCounts', 'moderationCounts', 'userModerationCounts', 'notices', 'userFieldsInfo')
    Run Time: 0.000811
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_data_registryrangePRIMARYPRIMARY27 26Using where
  2. SELECT data_key, data_value
    FROM xf_data_registry
    WHERE data_key IN ('brListenerClasses', 'brBriviumAddOns')
    Run Time: 0.000266
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_data_registryrangePRIMARYPRIMARY27 2Using where
  3. SELECT *
    FROM xf_brivium_addon
    ORDER BY addon_id
    Run Time: 0.000216
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_brivium_addonindex PRIMARY77 1 
  4. INSERT INTO xf_data_registry
    	(data_key, data_value)
    VALUES
    	(?, ?)
    ON DUPLICATE KEY UPDATE
    	data_value = VALUES(data_value)
    Params: brBriviumAddOns, a:0:{}
    Run Time: 0.000159
  5. SELECT cache_value
    FROM xf_permission_combination
    WHERE permission_combination_id = ?
    Params: 1
    Run Time: 0.000299
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLExf_permission_combinationconstPRIMARYPRIMARY4const1 
  6. SELECT thread.*
    	,
    		user.gender, user.avatar_date, user.gravatar,
    		NULL AS thread_read_date,
    		0 AS thread_reply_banned,
    		0 AS thread_is_watched,
    		'' AS draft_message, NULL AS draft_extra
    FROM xf_thread AS thread
    
    		LEFT JOIN xf_user AS user ON
    			(user.user_id = thread.user_id)
    WHERE thread.thread_id = ?
    Params: 119326
    Run Time: 0.000523
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLEthreadconstPRIMARYPRIMARY4const1 
    SIMPLEuserconstPRIMARYPRIMARY4const1 
  7. SELECT node.*, forum.*
    	,
    	permission.cache_value AS node_permission_cache,
    		NULL AS forum_read_date
    FROM xf_forum AS forum
    INNER JOIN xf_node AS node ON (node.node_id = forum.node_id)
    
    	LEFT JOIN xf_permission_cache_content AS permission
    		ON (permission.permission_combination_id = 1
    			AND permission.content_type = 'node'
    			AND permission.content_id = forum.node_id)
    WHERE node.node_id = ?
    Params: 25
    Run Time: 0.000434
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLEforumconstPRIMARYPRIMARY4const1 
    SIMPLEnodeconstPRIMARYPRIMARY4const1 
    SIMPLEpermissionconstPRIMARYPRIMARY35const,const,const1 
  8. SELECT post.*
    	,
    		thread.*, thread.user_id AS thread_user_id, thread.username AS thread_username,
    		thread.post_date AS thread_post_date,
    		post.user_id, post.username, post.post_date,
    		bb_code_parse_cache.parse_tree AS message_parsed, bb_code_parse_cache.cache_version AS message_cache_version,
    		user.*, IF(user.username IS NULL, post.username, user.username) AS username,
    		user_profile.*,
    		user_privacy.*,
    		signature_parse_cache.parse_tree AS signature_parsed, bb_code_parse_cache.cache_version AS signature_cache_version,
    		session_activity.view_date AS last_view_date,
    		0 AS like_date
    FROM xf_post AS post
    
    		INNER JOIN xf_thread AS thread ON
    			(thread.thread_id = post.thread_id)
    		LEFT JOIN xf_bb_code_parse_cache AS bb_code_parse_cache ON
    			(bb_code_parse_cache.content_type = 'post' AND bb_code_parse_cache.content_id = post.post_id)
    		LEFT JOIN xf_user AS user ON
    			(user.user_id = post.user_id)
    		LEFT JOIN xf_user_profile AS user_profile ON
    			(user_profile.user_id = post.user_id)
    		LEFT JOIN xf_user_privacy AS user_privacy ON
    			(user_privacy.user_id = post.user_id)
    		LEFT JOIN xf_bb_code_parse_cache AS signature_parse_cache ON
    			(signature_parse_cache.content_type = 'signature' AND signature_parse_cache.content_id = post.user_id)
    		LEFT JOIN xf_session_activity AS session_activity ON
    			(post.user_id > 0 AND session_activity.user_id = post.user_id AND session_activity.unique_key = CAST(post.user_id AS BINARY))
    WHERE (
    		(post.thread_id = ?  AND (post.position >= 0 AND post.position < 10) )
    		
    		
    	)
    	AND (post.message_state IN ('visible'))
    ORDER BY post.position ASC, post.post_date ASC
    Params: 119326
    Run Time: 0.002429
    Select TypeTableTypePossible KeysKeyKey LenRefRowsExtra
    SIMPLEthreadconstPRIMARYPRIMARY4const1Using filesort
    SIMPLEpostrefthread_id_post_date,thread_id_positionthread_id_post_date4const1Using index condition; Using where
    SIMPLEbb_code_parse_cacheeq_refcontent_type_idcontent_type_id31const,xenforo.cc.post.post_id1Using where
    SIMPLEusereq_refPRIMARYPRIMARY4xenforo.cc.post.user_id1 
    SIMPLEuser_profileeq_refPRIMARYPRIMARY4xenforo.cc.post.user_id1 
    SIMPLEuser_privacyeq_refPRIMARYPRIMARY4xenforo.cc.post.user_id1 
    SIMPLEsignature_parse_cacheeq_refcontent_type_idcontent_type_id31const,xenforo.cc.post.user_id1Using where
    SIMPLEsession_activityeq_refPRIMARYPRIMARY22xenforo.cc.post.user_id,func1Using where
  9. INSERT  INTO xf_thread_view
    	(thread_id)
    VALUES
    	(?)
    Params: 119326
    Run Time: 0.000091
  10. INSERT INTO `xf_session` (`session_id`, `session_data`, `expiry_date`) VALUES (?, ?, ?)
    Params: d68fc3bf5814fe9c0eb109a4aeec0482, , 1714237094
    Run Time: 0.000703
  11. INSERT INTO xf_session_activity
    	(user_id, unique_key, ip, controller_name, controller_action, view_state, params, view_date, robot_key)
    VALUES
    	(?, ?, ?, ?, ?, ?, ?, ?, ?)
    ON DUPLICATE KEY UPDATE
    	ip = VALUES(ip),
    	controller_name = VALUES(controller_name),
    	controller_action = VALUES(controller_action),
    	view_state = VALUES(view_state),
    	params = VALUES(params),
    	view_date = VALUES(view_date),
    	robot_key = VALUES(robot_key)
    Params: 0, , , XenForo_ControllerPublic_Thread, Index, valid, thread_id=119326, 1714233494,
    Run Time: 0.000118
  12. INSERT INTO xf_bb_code_parse_cache
    	(content_type, content_id, parse_tree, cache_version, cache_date)
    VALUES (?, ?, ?, ?, ?)
    ON DUPLICATE KEY UPDATE parse_tree = VALUES(parse_tree),
    	cache_version = VALUES(cache_version),
    	cache_date = VALUES(cache_date)
    Params: post, 122829, a:54:{i:0;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:12:"热门评论";}}i:1;s:1183:" 匿名人士 | 2014-09-02 11:43:32 现 在 的 垃 圾 评 论 太 多 了 , 简 直 没 法 看 , 希 望 西 恩 加 入 折 叠 评 论 功 能 , 起 码 我 们 能 清 理 一 部 分 不 想 看 的 垃 圾 评 论!! 支持:0 | 反对:0 匿名人士 | 2014-09-02 11:39:04 雷军:小米云服务采用金山安全软件,无懈可击。来吧猴子们,尽管放马来攻。 支持:0 | 反对:0 Y_qq_ 1811F7D6B848F53AF5AADB03F5 | 2014-09-02 11:37:31 好大 支持:0 | 反对:0 匿名人士 | 2014-09-02 11:36:50 撸否? 支持:0 | 反对:0 匿名人士 | 2014-09-02 11:49:09 你没看到套图吧,留下邮箱我给你 支持:0 | 反对:0 匿名人士 | 2014-09-02 11:47:07 只说明Apple傻-B,没有限制密码试错次数,让人可以字典攻击。 支持:0 | 反对:0 匿名人士 | 2014-09-02 11:46:28 人家都公布脚本了你还在这猜可能性,这是骗稿费还是挖坟? 支持:0 | 反对:0 匿名人士 | 2014-09-02 11:46:04 没露点的也好意思说是艳照 支持:0 | 反对:0 9月2日消息,科技博客Techcrunch对近期的好莱坞女星艳照门进行全方位分析,";i:2;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:144:"文章指出,这只是黑客针对特定目标的攻击事件,并不意味着iCloud不安全,也没有证据证明iCloud被黑客攻破。";}}i:3;s:2:" ";i:4;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:62:"http://static.cnbetacdn.com/newsimg/2014/0902/51_1k1jGjWQE.jpg";}}i:5;s:2:" ";i:6;a:4:{s:3:"tag";s:6:"center";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[CENTER]";i:1;s:9:"[/CENTER]";}s:8:"children";a:1:{i:0;s:45:"詹妮弗劳伦斯遭到泄露的照片之一";}}i:7;s:574:" 包括詹妮弗•劳伦斯、艾莉安娜•格兰德、维多利亚•嘉蒂斯和凯特•厄普顿在内的约一百多位好莱坞女星的艳照被泄露到网上,据称泄露源头是苹果iCloud账户。iCloud会自动存储照片、电子邮件、联系人和其他信息到网上,让用户在不同的设备间保持数据同步。这些女星的iCloud账户被黑客破解,导致这些艳照被泄露到了网站,很多照片已经被证实是真实的,特别是劳伦斯的那些照片。本次事件中有如下几个关键词值得我们注意: ";i:8;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:6:"媒体";}}i:9;s:336:" 主流媒体称这些女星的电话“被黑”,一般来说,这样的措词非常罕见。 劳伦斯曾经说过她使用iCloud服务,她说:“我的iCloud一直让我备份,我不知道如何备份,所以我就让它自己备份就好了。”泄露的照片也显示绝大多数都是使用苹果设备拍摄的。 ";i:10;a:4:{s:3:"tag";s:3:"img";s:6:"option";N;s:8:"original";a:2:{i:0;s:5:"[IMG]";i:1;s:6:"[/IMG]";}s:8:"children";a:1:{i:0;s:62:"http://static.cnbetacdn.com/newsimg/2014/0902/51_1k1jGjZMt.jpg";}}i:11;s:2:" ";i:12;a:4:{s:3:"tag";s:6:"center";s:6:"option";N;s:8:"original";a:2:{i:0;s:8:"[CENTER]";i:1;s:9:"[/CENTER]";}s:8:"children";a:1:{i:0;s:30:"配图为彭博社视频截图";}}i:13;s:2:" ";i:14;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:6:"黑客";}}i:15;s:79:" 有说法是iCloud“被黑”,不过没有得到苹果方面的证实。 ";i:16;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:249:"最大的可能就是黑客并没有破解苹果的安全机制,他们只是针对特定目标,使用社会工程学,进行密码暴力破解,或者使用了苹果的“忘记密码”功能。他们也可能使用了其他非技术手段。";}}i:17;s:2:" ";i:18;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:33:"猜解电子邮件地址和密码";}}i:19;s:364:" 在《时代周刊》的一篇文章中,詹妮弗•劳伦斯曾经提到过她电子邮件中的一个关键词,这种公开留下线索的做法其实非常不聪明。一旦电子邮件地址泄露,黑客就可以使用发送特定邮件,比如伪装成苹果iTunes邮件,诱使用户登录黑客的虚假网页输入电子邮件地址和密码。 ";i:20;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:135:"如果用户在多项服务中使用相同的密码,那么黑客只要破解一个,就可以登入用户的电子邮件和iCloud。";}}i:21;s:378:" 同样的,苹果的“忘记密码”功能意味着如果你知道受害者的生日和安全问题答案,你就可以进入她的账户。这些女星作为公众人物留下了很多信息,因此猜出密码是很有可能的。 一旦登录,你可能无法查看自动上传至iCloud的照片或视频,但是却可以使用软件将它们全部下载下来。 ";i:22;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:21:"iCloud的安全机制";}}i:23;s:227:" 要进入照片流,你需要在一台全新的OSX或iOS机子上登陆iCloud,如果你这么做了,iCloud会发送一份电子邮件给你,表示有新设备登入。在其他已经登入这个iCloud账户的机器(";i:24;a:4:{s:3:"tag";s:3:"url";s:6:"option";s:56:"http://aos.prf.hn/click/camref:100lcC/creativeref:305226";s:8:"original";a:2:{i:0;s:64:"[URL='http://aos.prf.hn/click/camref:100lcC/creativeref:305226']";i:1;s:6:"[/URL]";}s:8:"children";a:1:{i:0;s:6:"iPhone";}}i:25;s:40:"、iPad、Mac)上也会收到通知。";i:26;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:261:"因此一旦你收到电子邮件和通知信息,正常的反应就是账户被黑了,应该马上更改密码。因为通知是即时的,因此密码也可以马上改掉,这意味着照片流中的照片根本来不及同步到黑客的机器上去。";}}i:27;s:2:" ";i:28;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:75:"这也是很多专家认为黑客没有攻破iCloud的主要原因之一。";}}i:29;s:2:" ";i:30;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:12:"暴力破解";}}i:31;s:310:" 另一种方法可能就是使用自动程序对iCloud账户进行暴力破解,虽然理论上可行,但实际上很难。 由于“寻找我的iPhone”的一个漏洞,科技网站The Next Web称,Github上的一个Python脚本允许黑客针对特定iCloud账户的密码进行暴力破解,不过";i:32;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:36:"苹果已经修补了这个漏洞。";}}i:33;s:2:" ";i:34;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:133:"现在使用这个Python脚本进行暴力破解的话,苹果会在输错5次密码后锁定账户,并要求用户更改密码。";}}i:35;s:419:"针对此次事件,苹果发言人娜塔莉•克里斯(Natalie Kerris)表示,公司对隐私问题非常重视,将积极对此次事件进行调查。 不过据开发这款工具的黑客Hackapp表示,很多服务的验证界面都存在这个漏洞。在被问到此次事件是否利用了这个漏洞,Hackapp表示,他没有看到相关证据,但他承认可以使用这个漏洞达到目的。 ";i:36;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:33:"是否通过其他服务破解?";}}i:37;s:209:" 有多张照片显示是来自于Android设备和网络摄像头,因此泄露的照片源头可能不是iCloud的备份服务。很多服务拥有自动备份工具,登录的方式也和iCloud类似。 ";i:38;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:9:"SNAPCHAT?";}}i:39;s:138:" 一些照片有文字覆盖,艳照有可能来自于Snapchat吗?可能性不大,它们更像是用户的手机屏幕的截图。 ";i:40;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:19:"通过WIFI破解?";}}i:41;s:116:" 黑客是否在女星出席活动时通过WIFI破解得到这些照片?目前还不清楚,也无法证实。 ";i:42;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:18:"有没有内应?";}}i:43;s:133:" 个人助理和保镖通常额可以接触到明星的电话。这种情况是有可能的,但这种传言无法得到证实。 ";i:44;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:21:"设备被偷导致?";}}i:45;s:196:" 明星或跟明星关系密切人士的手机或笔记本电脑被偷,导致照片泄露,这种情况以前发生过,以后也会发生。但这次是不是这个原因还不得而知。 ";i:46;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:30:"普通用户应该担心吗?";}}i:47;s:157:" 不用担心。iCloud可以说非常安全。这起事件看起来像是黑客使用上述方法针对著名和“高价值”的明星的特定攻击。 ";i:48;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:36:"如果更好保护自己的数据?";}}i:49;s:2:" ";i:50;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:171:"最好的办法就是在iCloud等任何在线账户上使用两步验证法,这意味着黑客必须拿到你的手机和发送到手机上的验证码才能登录账户";}}i:51;s:307:" 此外,安全问题要够复杂,不用使用qwerty和123456这种最愚蠢的密码。 如何还是不放心的话,可以通过iOS设备上的“设置-iCloud”,完全关闭iCloud照片同步功能,这样照片只会备份在手机或电脑上,你只要担心设备不要被偷就行了。 ";i:52;a:4:{s:3:"tag";s:1:"b";s:6:"option";N;s:8:"original";a:2:{i:0;s:3:"[B]";i:1;s:4:"[/B]";}s:8:"children";a:1:{i:0;s:12:"小心为上";}}i:53;s:332:" 这已经不是名人的照片第一次外泄。2011年,黑客克里斯多夫•查内(Christopher Chaney )通过猜解密码,进入了很多明星的电子邮件账户,泄露了很多照片。最后查内被捕,并被判处10年徒刑。 但这样的黑客很少被抓住,因此保管好自己的信息是关键。";}, 1621686945, 1714233494
    Run Time: 0.001010

Included Files (108, XenForo Classes: 62)

  1. index.php
  2. library/XenForo/Autoloader.php
  3. library/XenForo/Application.php
  4. library/Zend/Registry.php
  5. library/Lgpl/utf8.php
  6. library/Zend/Config.php
  7. library/config.php
  8. library/XenForo/FrontController.php
  9. library/XenForo/Dependencies/Public.php
  10. library/XenForo/Dependencies/Abstract.php
  11. library/Zend/Controller/Request/Http.php
  12. library/Zend/Controller/Request/Abstract.php
  13. library/Zend/Uri.php
  14. library/Zend/Controller/Response/Http.php
  15. library/Zend/Controller/Response/Abstract.php
  16. library/XenForo/Model/DataRegistry.php
  17. library/XenForo/Model.php
  18. library/Zend/Db.php
  19. library/Zend/Db/Adapter/Mysqli.php
  20. library/Zend/Db/Adapter/Abstract.php
  21. library/Zend/Db/Select.php
  22. library/Zend/Db/Expr.php
  23. library/Zend/Db/Profiler.php
  24. library/Zend/Db/Statement/Mysqli.php
  25. library/Zend/Db/Statement.php
  26. library/Zend/Db/Statement/Interface.php
  27. library/Zend/Db/Profiler/Query.php
  28. library/XenForo/CodeEvent.php
  29. library/XenForo/Options.php
  30. library/XenForo/Link.php
  31. library/XenForo/Template/Helper/Core.php
  32. library/XenResource/Listener/Proxy.php
  33. library/XenGallery/Listener.php
  34. library/Brivium/BriviumHelper/EventListeners.php
  35. library/Brivium/BriviumHelper/1000271/EventListeners.php
  36. library/SV/RedisCache/Listener.php
  37. library/BestAnswer/Listener.php
  38. library/SV/RedisCache/XenForo/Model/DataRegistry.php
  39. library/Brivium/BriviumHelper/Model/ListenerClass.php
  40. library/Brivium/BriviumHelper/1000271/Model/ListenerClass.php
  41. library/XenForo/Router.php
  42. library/XenForo/Route/Filter.php
  43. library/XenForo/Route/Interface.php
  44. library/XenForo/Route/ResponseSuffix.php
  45. library/XenForo/Route/Prefix.php
  46. library/XenForo/Route/Prefix/Threads.php
  47. library/XenForo/RouteMatch.php
  48. library/XenForo/ControllerPublic/Thread.php
  49. library/XenForo/ControllerPublic/Abstract.php
  50. library/XenForo/Controller.php
  51. library/BestAnswer/ControllerPublic/Thread.php
  52. library/XenForo/Input.php
  53. library/XenForo/Session.php
  54. library/XenForo/Helper/Ip.php
  55. library/XenForo/Visitor.php
  56. library/XenForo/Model/User.php
  57. library/BestAnswer/Model/User.php
  58. library/XenResource/Listener/Proxy/ModelUser.php
  59. library/XenGallery/Model/User.php
  60. library/XenForo/Permission.php
  61. library/XenForo/Helper/Php.php
  62. library/XenForo/Phrase.php
  63. library/XenForo/Locale.php
  64. library/XenForo/ControllerHelper/ForumThreadPost.php
  65. library/XenForo/ControllerHelper/Abstract.php
  66. library/XenForo/Model/Thread.php
  67. library/SV/RedisCache/XenForo/Model/Thread.php
  68. library/BestAnswer/Model/Thread.php
  69. library/BestAnswer/Model/BestAnswer.php
  70. library/XenForo/Model/Forum.php
  71. library/XenForo/Helper/String.php
  72. library/XenForo/Model/Post.php
  73. library/FreddysHouse/SignatureOnce/Event/LoadClassModel.php
  74. library/BestAnswer/Model/Post.php
  75. library/FreddysHouse/SignatureOnce/Model/Post.php
  76. library/XenForo/Model/Attachment.php
  77. library/XenForo/Model/Node.php
  78. library/XenForo/Route/Prefix/Categories.php
  79. library/XenForo/Route/Prefix/Forums.php
  80. library/XenForo/ControllerResponse/View.php
  81. library/XenForo/ControllerResponse/Abstract.php
  82. library/XenForo/Helper/Cookie.php
  83. library/XenResource/Listener/Template.php
  84. library/XenForo/ViewRenderer/HtmlPublic.php
  85. library/XenForo/ViewRenderer/Abstract.php
  86. library/XenForo/Template/Public.php
  87. library/XenForo/Template/Abstract.php
  88. library/XenForo/ViewPublic/Thread/View.php
  89. library/XenForo/ViewPublic/Base.php
  90. library/XenForo/View.php
  91. library/XenForo/BbCode/Parser.php
  92. library/XenForo/BbCode/Formatter/Base.php
  93. library/XenForo/ViewPublic/Helper/Message.php
  94. library/XenForo/BbCode/TextWrapper.php
  95. library/WhoHasVisited/Listener.php
  96. library/XenForo/Route/Prefix/Members.php
  97. library/XenForo/Template/FileHandler.php
  98. library/XenForo/Helper/File.php
  99. internal_data/templates/S.1,L.7,thread_view.php
  100. library/Brivium/RMDownloadTracker/EventListener/Listener.php
  101. library/XenForo/Route/Prefix/Posts.php
  102. library/XenForo/Model/Avatar.php
  103. library/XenForo/Helper/Criteria.php
  104. library/XenForo/Debug.php
  105. internal_data/templates/S.1,L.7,PAGE_CONTAINER.php
  106. internal_data/templates/S.1,L.7,xengallery_tab_links.php
  107. internal_data/templates/S.1,L.7,resources_tab_links.php
  108. library/XenForo/ViewRenderer/Json.php