{"id":59496,"date":"2022-05-05T10:02:12","date_gmt":"2022-05-05T05:02:12","guid":{"rendered":"https:\/\/uzsoft.uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/"},"modified":"2025-06-16T17:20:29","modified_gmt":"2025-06-16T12:20:29","slug":"kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism","status":"publish","type":"post","link":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/","title":{"rendered":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"59496\" class=\"elementor elementor-59496 elementor-47626\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3858e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f3858e1\" data-element_type=\"section\" data-e-type=\"section\">\r\n\t\t\r\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-91bb9a4\" data-id=\"91bb9a4\" data-element_type=\"column\" data-e-type=\"column\">\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a121818 elementor-widget elementor-widget-text-editor\" data-id=\"a121818\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.av-test.org\/en\/?r=1\" target=\"_blank\" rel=\"noopener\">AV-TEST<\/a> laboratoriyasi ma&#8217;lumotlariga ko&#8217;ra, har kuni 390 000 dan ortiq yangi zararli dasturlar topiladi. Zararli dasturlarning bu miqdori xakerlarga maqsad tanlashda deyarli cheksiz imkoniyatlar beradi. <\/p><p>Foydalanuvchilar ko&#8217;pincha tajovuzkorlar foydalanishdan mamnun bo&#8217;lgan bir xil keng tarqalgan xatolarga yo&#8217;l qo&#8217;yishadi.<\/p><p>Quyida foydalanuvchilarning eng yaxshi 10 ta xatosi va tarmoq xavfsizligini ta\u02bcminlash uchun ulardan qanday qochish kerakligi haqida qisqacha ma\u02bclumot berilgan.<\/p><p><strong>1) Shubhali havolalarni bosish<\/strong><\/p><p>Inc ta&#8217;kidlaganidek, foydalanuvchilar musiqa yuklab olish yoki bepul fotosuratlarni ko&#8217;rishda virtual &laquo;og&#8217;izdan-og&#8217;izga&raquo; ko&#8217;pincha &laquo;g&#8217;alati&raquo; saytlarning o&#8217;ljasiga tushib qolishadi.<\/p><p>Shubhali havolani bosish tizimingizda <a href=\"https:\/\/www.kaspersky.ru\/resource-center\/threats\/computer-viruses-and-malware-facts-and-faqs\">zararli<\/a> dasturlarni o&#8217;rnatishi mumkin, bu esa tajovuzkorlarga shaxsiy ma&#8217;lumotlaringizga, jumladan, bank hisoblari va kredit karta raqamlariga kirish imkonini beradi.<\/p><p>Xavfsiz tomonda bo&#8217;lish uchun yaxshi obro&#8217;ga ega saytlarga tashrif buyurishga harakat qiling. Qoidaga ko&#8217;ra, eng xavfsiz havolalar har qanday Google qidiruv natijalarining yuqori qismida paydo bo&#8217;ladi, lekin agar siz hali ham ishonchingiz komil bo&#8217;lmasa, havolani bosmang. <\/p><p><strong>2) Noma&#8217;lum flesh-disklardan foydalanish<\/strong><\/p><p>Fayllaringiz va tizimingizning zaxira nusxasini yaratish juda muhim, lekin kompyuteringizga birovning flesh-diski yoki USB flesh-diskini joylashtirganda doimo ehtiyot bo&#8217;ling.<\/p><p>Tashqi drayvlar zararli dasturlarni o&#8217;z ichiga olishi mumkin va bunday qulay &laquo;unutilgan&raquo; disk butun tarmoqni yuqtirish uchun etarli.<\/p><p>Xulosa: Agar bu sizning qurilmangiz bo&#8217;lmasa, undan foydalanmang. Boshqa mashinalarni yuqtirmasligingizga ishonch hosil qilish uchun qurilmangizni viruslar va boshqa zararli dasturlarga muntazam ravishda tekshirib turing. <\/p><p><strong>3) Soxta antivirus dasturini yuklab olish<\/strong><\/p><p>Har biringiz bepul antivirus dasturini darhol yuklab olmasangiz, kompyuteringiz xavf ostida bo&#8217;lishi haqida qalqib chiquvchi ogohlantirishlarga duch keldingiz.<\/p><p>Buzg&#8217;unchilar foydalanuvchilarni nima bo&#8217;layotganini tushunmasdan oldin fayllarni yuklab olishga ishontirishda mohir: ularning sevimli hiylasi zararli kodni kompyuter virusini tekshirish dasturi sifatida o&#8217;tkazib yuborishdir, bu foydalanuvchiga o&#8217;zini onlayn tahdidlardan himoya qilishga &laquo;yordam beradi&raquo;.<\/p><p>Biroq, ushbu havolaga bir marta bosish sizning kompyuteringizda qonuniy xavfsizlik echimlaridan foydalanishni bloklashi mumkin. Ekranda xavfli havolalar paydo bo&#8217;lishining oldini olish uchun antivirus dasturingiz doimo o&#8217;rnatilgan qalqib chiquvchi bloker bilan yangilanganligiga ishonch hosil qiling. <\/p><p><strong>4) Veb-kamera hujumlari<\/strong><\/p><p>Daily Mail yozganidek, veb-kamerangizni buzish jiddiy oqibatlarga olib keladigan shaxsiy hayotingizga tajovuzga olib kelishi mumkin. Zararli dasturlarning ma&#8217;lum bir turi tajovuzkorlarga kompyuteringizga masofadan kirish va veb-kamerangizni yoqish imkoniyatini beradi. <\/p><p>Kompyuteringizning kamerasi tarmoqqa ulangan boshqa qurilmalar kabi himoyalanmagan, shuning uchun sizning kamerangiz yoqilganligini va ehtimol yozib olishning asosiy belgisi yonib turgan LEDdir.<\/p><p>Kamera ustiga shunchaki lenta yopishtirishning o\u2018zi etarli emas: u tovushni bloklamaydi, shuning uchun <a href=\"http:\/\/fb.ru\/article\/285070\/kak-otklyuchit-kameru-na-noutbuke-prostyih-sposoba\">kamerani qanday o\u2018chirishni<\/a> bilganingizga ishonch hosil qiling. <\/p><p><strong>5) Ikki faktorli autentifikatsiya bo&#8217;lmaganda turli saytlar uchun bitta paroldan foydalanish<\/strong><\/p><p>Agar siz onlayn-do&#8217;konlar, banklar va davlat hisoblariga kirish uchun xuddi shu paroldan foydalansangiz, siz xakerlik o&#8217;yinisiz. Ushbu &laquo;romashka zanjiri&raquo; ularga faqat bittasini buzish orqali barcha hisoblaringizga kirish imkonini beradi. <\/p><p>Turli hisoblar uchun turli xil parollardan foydalaning va ularni har olti oyda o&#8217;zgartiring. Albatta, bir nechta parollarni eslab qolish oson emas, lekin agar jinoyatchi sizning barcha akkauntlaringizni qo&#8217;lga kiritsa, shaxsiy ma&#8217;lumotni o&#8217;g&#8217;irlash oqibatlari bilan kurashishdan ko&#8217;ra yaxshiroqdir. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>AV-TEST laboratoriyasi ma&#8217;lumotlariga ko&#8217;ra, har kuni 390 000 dan ortiq yangi zararli dasturlar topiladi. Zararli dasturlarning bu miqdori xakerlarga maqsad tanlashda deyarli cheksiz imkoniyatlar beradi. Foydalanuvchilar ko&#8217;pincha tajovuzkorlar foydalanishdan mamnun bo&#8217;lgan bir xil keng tarqalgan xatolarga yo&#8217;l qo&#8217;yishadi. Quyida foydalanuvchilarning eng yaxshi 10 ta xatosi va tarmoq xavfsizligini ta\u02bcminlash uchun ulardan qanday qochish kerakligi haqida [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":54508,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_schema_page_type":"","_yoast_wpseo_schema_article_type":"","footnotes":""},"categories":[52855],"tags":[],"class_list":["post-59496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-yangiliklar"],"featured_image_src":{"landsacpe":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg",620,380,false],"list":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg",463,284,false],"medium":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14-300x184.jpeg",300,184,true],"full":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg",620,380,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz<\/title>\n<meta name=\"description\" content=\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/\" \/>\n<meta property=\"og:locale\" content=\"uz_UZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz\" \/>\n<meta property=\"og:description\" content=\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/\" \/>\n<meta property=\"og:site_name\" content=\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzsoft.uz\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-05T05:02:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T12:20:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BWS.Uz IT Technoligies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bws_info\" \/>\n<meta name=\"twitter:site\" content=\"@bws_info\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BWS.Uz IT Technoligies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 daqiqa\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/\"},\"author\":{\"name\":\"BWS.Uz IT Technoligies\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#\\\/schema\\\/person\\\/b4211fdbf4859a7db7358ea60755f54a\"},\"headline\":\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)\",\"datePublished\":\"2022-05-05T05:02:12+00:00\",\"dateModified\":\"2025-06-16T12:20:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/\"},\"wordCount\":492,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/473592224ef40003d6761beafd489b14.jpeg\",\"articleSection\":[\"Yangiliklar\"],\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#respond\"]}],\"copyrightYear\":\"2022\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/\",\"name\":\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/473592224ef40003d6761beafd489b14.jpeg\",\"datePublished\":\"2022-05-05T05:02:12+00:00\",\"dateModified\":\"2025-06-16T12:20:29+00:00\",\"description\":\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#breadcrumb\"},\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/473592224ef40003d6761beafd489b14.jpeg\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/473592224ef40003d6761beafd489b14.jpeg\",\"width\":620,\"height\":380,\"caption\":\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/bosh-sahifa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Yangiliklar\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/category\\\/yangiliklar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"name\":\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz\",\"description\":\"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.\",\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"alternateName\":\"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"uz-UZ\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\",\"name\":\"\u041e\u041e\u041e Starlab\",\"alternateName\":\"Uzsoft.uz\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/uzsoft.uz\",\"https:\\\/\\\/x.com\\\/bws_info\",\"https:\\\/\\\/www.instagram.com\\\/uzsoft.uz\",\"https:\\\/\\\/www.pinterest.com\\\/starlabuz\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCqshldoZsm4jd9DScHqZhdQ\"],\"description\":\"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.\",\"legalName\":\"Starlab MCHJ\",\"foundingDate\":\"2016-11-15\",\"duns\":\"537716592\",\"leiCode\":\"894500IR5ZAAEGVJ4D53\",\"naics\":\"454110\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"},\"publishingPrinciples\":\"https:\\\/\\\/uzsoft.uz\\\/principy-publikatsii\\\/\",\"ownershipFundingInfo\":\"https:\\\/\\\/uzsoft.uz\\\/sobstvennost-i-finansirovanie\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-obratnoy-svyazi\\\/\",\"correctionsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-ispravleniy\\\/\",\"ethicsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-etiki\\\/\",\"diversityPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-raznoobraziya\\\/\",\"diversityStaffingReport\":\"https:\\\/\\\/uzsoft.uz\\\/otchet-o-kadrovom-raznoobrazii\\\/\",\"hasMerchantReturnPolicy\":{\"@type\":\"MerchantReturnPolicy\",\"applicableCountry\":\"UZ\",\"returnPolicyCategory\":\"https:\\\/\\\/schema.org\\\/MerchantReturnNotPermitted\",\"merchantReturnLink\":\"https:\\\/\\\/uzsoft.uz\\\/refund_returns\\\/\"},\"address\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"41.289614319763196\",\"longitude\":\"69.22166103901668\"},\"telephone\":[\"+998712001999\",\"+998712031999\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"telephone\":\"+998712001999\",\"email\":\"info@starlab.uz\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@starlab.uz\",\"faxNumber\":\"+998712001999\",\"areaServed\":\"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\",\"vatID\":\"326060121141\",\"taxID\":\"304426154\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#\\\/schema\\\/person\\\/b4211fdbf4859a7db7358ea60755f54a\",\"name\":\"BWS.Uz IT Technoligies\",\"description\":\"\u042d\u0442\u043e\u0442 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Starlab\",\"sameAs\":[\"https:\\\/\\\/starlab.uz\"]},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#local-main-place-address\",\"streetAddress\":\"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.\",\"addressLocality\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"postalCode\":\"100043\",\"addressRegion\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"addressCountry\":\"UZ\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"width\":233,\"height\":54,\"caption\":\"\u041e\u041e\u041e Starlab\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\" \/>\n<meta name=\"geo.position\" content=\"41.289614319763196;69.22166103901668\" \/>\n<meta name=\"geo.region\" content=\"O&#039;zbekiston\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","description":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/","og_locale":"uz_UZ","og_type":"article","og_title":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz","og_description":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.","og_url":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/","og_site_name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d","article_publisher":"https:\/\/www.facebook.com\/uzsoft.uz","article_published_time":"2022-05-05T05:02:12+00:00","article_modified_time":"2025-06-16T12:20:29+00:00","og_image":[{"width":620,"height":380,"url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg","type":"image\/jpeg"}],"author":"BWS.Uz IT Technoligies","twitter_card":"summary_large_image","twitter_creator":"@bws_info","twitter_site":"@bws_info","twitter_misc":{"Written by":"BWS.Uz IT Technoligies","Est. reading time":"2 daqiqa"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#article","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/"},"author":{"name":"BWS.Uz IT Technoligies","@id":"https:\/\/uzsoft.uz\/uz\/#\/schema\/person\/b4211fdbf4859a7db7358ea60755f54a"},"headline":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)","datePublished":"2022-05-05T05:02:12+00:00","dateModified":"2025-06-16T12:20:29+00:00","mainEntityOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/"},"wordCount":492,"commentCount":0,"publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg","articleSection":["Yangiliklar"],"inLanguage":"uz-UZ","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#respond"]}],"copyrightYear":"2022","copyrightHolder":{"@id":"https:\/\/uzsoft.uz\/#organization"}},{"@type":"WebPage","@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/","url":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/","name":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#primaryimage"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg","datePublished":"2022-05-05T05:02:12+00:00","dateModified":"2025-06-16T12:20:29+00:00","description":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism) \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","breadcrumb":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#breadcrumb"},"inLanguage":"uz-UZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/"]}]},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#primaryimage","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2022\/05\/473592224ef40003d6761beafd489b14.jpeg","width":620,"height":380,"caption":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)"},{"@type":"BreadcrumbList","@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/uzsoft.uz\/uz\/bosh-sahifa\/"},{"@type":"ListItem","position":2,"name":"Yangiliklar","item":"https:\/\/uzsoft.uz\/uz\/category\/yangiliklar\/"},{"@type":"ListItem","position":3,"name":"Kompyuteringizni xakerlik va xakerlardan qanday himoya qilish kerak (1-qism)"}]},{"@type":"WebSite","@id":"https:\/\/uzsoft.uz\/uz\/#website","url":"https:\/\/uzsoft.uz\/uz\/","name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz","description":"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.","publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"alternateName":"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzsoft.uz\/uz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"uz-UZ"},{"@type":["Organization","Place"],"@id":"https:\/\/uzsoft.uz\/uz\/#organization","name":"\u041e\u041e\u041e Starlab","alternateName":"Uzsoft.uz","url":"https:\/\/uzsoft.uz\/uz\/","logo":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#local-main-organization-logo"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/uzsoft.uz","https:\/\/x.com\/bws_info","https:\/\/www.instagram.com\/uzsoft.uz","https:\/\/www.pinterest.com\/starlabuz","https:\/\/www.youtube.com\/channel\/UCqshldoZsm4jd9DScHqZhdQ"],"description":"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.","legalName":"Starlab MCHJ","foundingDate":"2016-11-15","duns":"537716592","leiCode":"894500IR5ZAAEGVJ4D53","naics":"454110","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"},"publishingPrinciples":"https:\/\/uzsoft.uz\/principy-publikatsii\/","ownershipFundingInfo":"https:\/\/uzsoft.uz\/sobstvennost-i-finansirovanie\/","actionableFeedbackPolicy":"https:\/\/uzsoft.uz\/politika-obratnoy-svyazi\/","correctionsPolicy":"https:\/\/uzsoft.uz\/politika-ispravleniy\/","ethicsPolicy":"https:\/\/uzsoft.uz\/politika-etiki\/","diversityPolicy":"https:\/\/uzsoft.uz\/politika-raznoobraziya\/","diversityStaffingReport":"https:\/\/uzsoft.uz\/otchet-o-kadrovom-raznoobrazii\/","hasMerchantReturnPolicy":{"@type":"MerchantReturnPolicy","applicableCountry":"UZ","returnPolicyCategory":"https:\/\/schema.org\/MerchantReturnNotPermitted","merchantReturnLink":"https:\/\/uzsoft.uz\/refund_returns\/"},"address":{"@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"41.289614319763196","longitude":"69.22166103901668"},"telephone":["+998712001999","+998712031999"],"contactPoint":{"@type":"ContactPoint","telephone":"+998712001999","email":"info@starlab.uz"},"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@starlab.uz","faxNumber":"+998712001999","areaServed":"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d","vatID":"326060121141","taxID":"304426154"},{"@type":"Person","@id":"https:\/\/uzsoft.uz\/uz\/#\/schema\/person\/b4211fdbf4859a7db7358ea60755f54a","name":"BWS.Uz IT Technoligies","description":"\u042d\u0442\u043e\u0442 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Starlab","sameAs":["https:\/\/starlab.uz"]},{"@type":"PostalAddress","@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#local-main-place-address","streetAddress":"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.","addressLocality":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","postalCode":"100043","addressRegion":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","addressCountry":"UZ"},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/kompyuteringizni-xakerlik-va-xakerlardan-qanday-himoya-qilish-kerak-1-qism\/#local-main-organization-logo","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","width":233,"height":54,"caption":"\u041e\u041e\u041e Starlab"}]},"geo.placename":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","geo.position":{"lat":"41.289614319763196","long":"69.22166103901668"},"geo.region":"O'zbekiston"},"_links":{"self":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/59496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/comments?post=59496"}],"version-history":[{"count":0,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/59496\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media\/54508"}],"wp:attachment":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media?parent=59496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/categories?post=59496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/tags?post=59496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}