{"id":59530,"date":"2021-11-17T11:15:14","date_gmt":"2021-11-17T06:15:14","guid":{"rendered":"https:\/\/uzsoft.uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/"},"modified":"2025-06-19T14:55:17","modified_gmt":"2025-06-19T09:55:17","slug":"hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi","status":"publish","type":"post","link":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/","title":{"rendered":"&laquo;Hackerlar qo&#8217;lida&raquo;: buzilgan smartfonning asosiy belgilari nomlanadi"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"59530\" class=\"elementor elementor-59530 elementor-44736\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-511f5a2 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"511f5a2\" data-element_type=\"section\" data-e-type=\"section\">\r\n\t\t\r\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1691e29\" data-id=\"1691e29\" data-element_type=\"column\" data-e-type=\"column\">\r\n\t\t\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4a0a3c elementor-widget elementor-widget-text-editor\" data-id=\"a4a0a3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Kiberxavfsizlik bo\u2018yicha mutaxassislar smartfon va boshqa gadjetlar buzib kirilganini ko\u2018rsatuvchi asosiy belgilarni nomladi. Bularga har qanday shubhali faoliyat, ilovalardagi nosozliklar yoki batareyaning tez zaryadsizlanishi kiradi. Bundan tashqari, pul egasining hisobidan yo&#8217;qola boshlashi mumkin. \u201cIzvestiya\u201d smartfonni buzish nega xavfli ekanligini va bunday holatda nima qilish kerakligini aniqladi.   <\/p><h2>Buzilgan smartfon belgilari<\/h2><p>Mutaxassislar smartfon va boshqa gadjetlar buzib kirilganini ko\u2018rsatuvchi belgilarni <a href=\"https:\/\/1prime.ru\/telecommunications_and_technologies\/20211106\/835121775.html?utm_source=yxnews&amp;utm_medium=desktop\" target=\"_blank\" rel=\"noopener\">nomladi<\/a>. Bularga qurilmaning nostandart xatti-harakatlari kiradi: masalan, telefon yoki planshetga hech kim tegmaganida ekran to&#8217;satdan yoqiladi. <\/p><p>RTM Group bosh direktori Evgeniy Tsarev &laquo;Izvestiya&raquo; bilan suhbatda siz o&#8217;rnatmagan ilovalarning ko&#8217;rinishiga, tarmoq trafigining ko&#8217;payishiga va hisoblar bilan bog&#8217;liq muammolarga (masalan, parol uchun doimiy so&#8217;rovlar yoki hatto uning yo&#8217;qolishi) e&#8217;tibor berishni maslahat berdi.<\/p><p>\u2014 Zararli kod mavjudligini ilovalar ichida emas, balki tizim ekranida ko&#8217;rsatiladigan intruziv bannerlar ham ko&#8217;rsatishi mumkin. Yoki notanish dastur geolokatsiya, kontaktlar va boshqa shaxsiy ma\u02bclumotlarga kirish uchun qo\u02bbshimcha ruxsatlarni so\u02bbray boshlaganda, \u2014 qo\u02bbshimcha qildi mobil texnologiyalar uchun dasturiy mahsulotlarning katta ishlab chiqaruvchisi David Grigoryan. <\/p><p> <\/p><p><img decoding=\"async\" class=\"alignnone wp-image-44739 size-full\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_111498318_XL-1.jpg\" alt=\"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi\" width=\"900\" height=\"506\" srcset=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_111498318_XL-1.jpg 900w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_111498318_XL-1-600x337.jpg 600w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_111498318_XL-1-768x432.jpg 768w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_111498318_XL-1-433x243.jpg 433w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p><p>O&#8217;z navbatida, Oberon kompaniyasining IT-direktori Dmitriy Pyatunin xabarlar va qo&#8217;ng&#8217;iroqlar tafsilotlarini tekshirishni tavsiya qildi, siz bilan aloqasi bo&#8217;lmagan yozuvlar va mobil xizmatlar uchun abonent to&#8217;lovi &#8211; buzg&#8217;unchilik holatlarida u oshishi mumkin. Tasdiqlash kodi bo&#8217;lgan bank va boshqa ilovalarning bildirishnomalari, agar siz kodni tekshirish bilan operatsiya tashabbuskori bo&#8217;lmasangiz, alohida e&#8217;tiborga loyiqdir. <\/p><p>Shuningdek, gadjetda zararli dasturlar mavjudligini ko\u2018rsatuvchi belgilar orasida protsessor, operativ xotira, tarmoqdagi muammolar, qayta ishga tushirish va qurilmaning haddan tashqari qizib ketishi doimiy ravishda ortib borishi mumkin, dedi RBK.money fintech kompaniyasi bosh direktori Denis Burlakov.<\/p><p>Ammo qurilmaning batareyasi tezda tugaydi, &laquo;Xavfsizlik kodi&raquo; kompaniyasining mahsulotni ilgari surish bo&#8217;limi boshlig&#8217;i Pavel Korostelevning so&#8217;zlariga ko&#8217;ra, har doim ham buzg&#8217;unchilikni ko&#8217;rsatmaydi: ehtimol, odam shunchaki smartfonga juda ko&#8217;p ilovalarni o&#8217;rnatgan va ishga tushirgan yoki elektr ta&#8217;minoti pallasida texnik nosozlik bo&#8217;lgan.<\/p><h2><strong>Gadjetlarni kim va nima uchun buzadi<\/strong><\/h2><p>Dmitriy Pyatuninning fikricha, gadjetlarni buzishning ikkita asosiy usuli mavjud. Ularning eng oddiylari qurilmaga to&#8217;g&#8217;ridan-to&#8217;g&#8217;ri kirishdir. <\/p><p>&#8211; Misol uchun, agar biror kishi telefonini ish joyida yoki vijdonsiz xizmat ko&#8217;rsatish markazida qoldirgan bo&#8217;lsa, &#8211; deb tushuntirdi ekspert &laquo;Izvestiya&raquo; ga. \u2014 To\u02bbg\u02bbridan-to\u02bbg\u02bbri ulanishdan foydalanib, siz telefonning yuklovchisini almashtirishingiz va smartfon ekranini yozib oladigan, matn kiritadigan, trafikni kuzatuvchi yoki masofadan boshqarishni ta\u02bcminlovchi agent dasturini o\u02bbrnatish uchun kirish huquqiga ega bo\u02bblishingiz mumkin. <\/p><p><img decoding=\"async\" class=\"alignnone wp-image-44740 size-full\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_268002374_XL-1.jpg\" alt=\"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi\" width=\"900\" height=\"506\" srcset=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_268002374_XL-1.jpg 900w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_268002374_XL-1-600x337.jpg 600w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_268002374_XL-1-768x432.jpg 768w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_268002374_XL-1-433x243.jpg 433w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p><p>Ikkinchi keng tarqalgan usul &#8211; rasmiy do&#8217;konlardan tashqarida tarqatilgan ilovalarga zararli kodni kiritish. Ishlab chiquvchi foydalanuvchidan havolaga rioya qilishni, APK faylini yuklab olishni va xavfsizlik sozlamalarida &laquo;ilovani o&#8217;rnatish uchun&raquo; zarur ruxsatlarni berishni taklif qiladi. Ularda zararlangan xatcho\u2018plar tekshirilmaydi va ularda zararli kod bo\u2018lishi mumkin.  <\/p><p>\u2014 Kiberjinoyatchilar, shuningdek, shaxsga maxsus tayyorlangan portalga havola bilan xat yoki xabar yuborishlari mumkin, u yerda ulardan shaxsiy yoki to\u02bblov ma\u02bclumotlarini kiritish so\u02bbraladi, \u2014 deya qo\u02bbshimcha qildi Pavel Korostelev. \u2014 Qoida tariqasida, fishing saytlari davlat idoralari, banklar, chakana savdo tarmoqlari va boshqalar resurslariga taqlid qiladi. Ular yaxshi foyda va&#8217;da qiladigan jozibali taklifni e&#8217;lon qilishadi.  <\/p><p><img decoding=\"async\" class=\"alignnone wp-image-44741 size-full\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_75323901_XL-1.jpg\" alt=\"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi\" width=\"900\" height=\"506\" srcset=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_75323901_XL-1.jpg 900w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_75323901_XL-1-600x337.jpg 600w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_75323901_XL-1-768x432.jpg 768w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_75323901_XL-1-433x243.jpg 433w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p><p>Denis Burlakovning so\u02bbzlariga ko\u02bbra, tajovuzkorlar uchun eng ko\u02bbp ko\u02bbrilgan maqsadlar ijtimoiy tarmoqlardagi akkauntlar, bank ilovalari, elektron pochta va foydalanuvchining pullariga kirishga yordam beradigan har qanday shaxsiy ma\u02bclumotlar uchun parollardir.<\/p><p>Xakerlarni fotosuratlar, videolar yoki yozishmalar ham qiziqtirishi mumkin, ayniqsa smartfon egasi jamoat arbobi bo&#8217;lsa.<\/p><h2><strong>Nima uchun smartfonni buzish xavfli?<\/strong><\/h2><p>Avvalo, smartfonni buzish egasiga pul va shaxsiy ma&#8217;lumotlarni yo&#8217;qotish bilan tahdid qiladi. Agar ular qurilma ustidan nazoratni qo\u2018lga kiritsa, jinoyatchilar xalqaro qo\u2018ng\u2018iroqlarni amalga oshirishi, bank ilovasidagi moliyaviy operatsiyalarga kirishi yoki gadjetdan firibgarlik uchun foydalanishi mumkin, deb ta\u2019kidladi Dmitriy Pyatunin. <\/p><p>Shuning uchun smartfon egalari o&#8217;z qurilmalarini himoya qilish uchun oddiy qoidalarga amal qilishlari kerak. Masalan, qurilmani xizmatga topshirayotganda SIM-kartani olib tashlashingiz, zaxira nusxasini yaratishingiz va telefonni zavod sozlamalariga qaytarishingiz kerak. <\/p><p>&laquo;Smartfonni qaytarib bergandan so&#8217;ng, kirish kodini tekshirish muhim &#8211; agar u qayta tiklangan bo&#8217;lsa, siz telefonni zavod sozlamalarini qayta tiklashingiz kerak&raquo;, &#8211; maslahat berdi ekspert.<\/p><p>U, shuningdek, odamlarni havolalar orqali joylashgan APK fayllaridan noma&#8217;lum ilovalarni o&#8217;rnatmaslikka va so&#8217;ralgan ruxsatlarga e&#8217;tibor berishga chaqirdi &#8211; har doim ham hamma narsaga rozi bo&#8217;lmaslik kerak.<\/p><p><img decoding=\"async\" class=\"alignnone wp-image-44742 size-full\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_106766008_XL-1.jpg\" alt=\"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi\" width=\"900\" height=\"506\" srcset=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_106766008_XL-1.jpg 900w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_106766008_XL-1-600x337.jpg 600w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_106766008_XL-1-768x432.jpg 768w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_106766008_XL-1-433x243.jpg 433w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p><p>\u2014 Bir nechta xizmatlar (Wi-Fi, ijtimoiy tarmoq, elektron pochta va ilovalar do\u02bbkoni hisobi) uchun bitta paroldan foydalanmang. Bitta xizmatni buzish qolganlarini xavf ostiga qo&#8217;yadi, &#8211; ta&#8217;kidladi &laquo;Izvestiya&raquo; manbasi. <\/p><p>O&#8217;z navbatida Pavel Korostelev smartfoningizga parol o&#8217;rnatishni, o&#8217;rnatilgan ilovalar va operatsion tizimni muntazam yangilab turishni va faqat rasmiy ilovalar do&#8217;konidan foydalanishni tavsiya qildi. Kibergigienaning oddiy qoidalarini ham yodda tutishingiz kerak: xabarlar va xatlardan havolalarga amal qilmang, hatto ular do&#8217;stlar tomonidan yuborilgan bo&#8217;lsa ham, shubhali saytlarda to&#8217;lov ma&#8217;lumotlarini qoldirmang. <\/p><p>Xulosa qilib aytganda, mutaxassislar Android qurilmalari egalariga antivirus ilovalaridan foydalanishni, iOS qurilmalari esa bulutli portallarda (iCloud) muhim ma\u2019lumotlarni takrorlamaslikni maslahat berdi.<\/p><p>\u2014 Ushbu tavsiyalar odamga mobil qurilmasini himoya qilishga yordam beradi. Ammo ishonchliroq usul ikkita smartfondan foydalanish bo&#8217;ladi: biri muhim va moliyaviy maqsadlarda (davlat xizmatlari, mobil banking, korporativ pochta), ikkinchisi esa ko&#8217;ngilochar tadbirlar (o&#8217;yinlar, onlayn kino, torrentlar) uchun. Shunday qilib, siz, albatta, ma&#8217;lumotlaringizni himoya qilish imkoniyatiga ega bo&#8217;lasiz, &#8211; deya xulosa qildi &laquo;BSS-Security&raquo; kompaniyasining bosh direktori Viktor Gulevich.  <\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/section>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Kiberxavfsizlik bo\u2018yicha mutaxassislar smartfon va boshqa gadjetlar buzib kirilganini ko\u2018rsatuvchi asosiy belgilarni nomladi. Bularga har qanday shubhali faoliyat, ilovalardagi nosozliklar yoki batareyaning tez zaryadsizlanishi kiradi. Bundan tashqari, pul egasining hisobidan yo&#8217;qola boshlashi mumkin. \u201cIzvestiya\u201d smartfonni buzish nega xavfli ekanligini va bunday holatda nima qilish kerakligini aniqladi. Buzilgan smartfon belgilari Mutaxassislar smartfon va boshqa gadjetlar buzib [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":54406,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_schema_page_type":"","_yoast_wpseo_schema_article_type":"","footnotes":""},"categories":[52855],"tags":[],"class_list":["post-59530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-yangiliklar"],"featured_image_src":{"landsacpe":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg",792,445,false],"list":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg",463,260,false],"medium":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1-300x169.jpg",300,169,true],"full":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg",900,506,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>&quot;Hackerlar qo&#039;lida&quot;: buzilgan smartfonning asosiy belgilari nomlanadi | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz<\/title>\n<meta name=\"description\" content=\"&quot;Hackerlar qo&#039;lida&quot;: buzilgan smartfonning asosiy belgilari nomlanadi \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/\" \/>\n<meta property=\"og:locale\" content=\"uz_UZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;Hackerlar qo&#039;lida&quot;: buzilgan smartfonning asosiy belgilari nomlanadi | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz\" \/>\n<meta property=\"og:description\" content=\"&quot;Hackerlar qo&#039;lida&quot;: buzilgan smartfonning asosiy belgilari nomlanadi \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/\" \/>\n<meta property=\"og:site_name\" content=\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzsoft.uz\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-17T06:15:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T09:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BWS.Uz IT Technoligies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bws_info\" \/>\n<meta name=\"twitter:site\" content=\"@bws_info\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BWS.Uz IT Technoligies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 daqiqa\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/\"},\"author\":{\"name\":\"BWS.Uz IT Technoligies\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#\\\/schema\\\/person\\\/b4211fdbf4859a7db7358ea60755f54a\"},\"headline\":\"&laquo;Hackerlar qo&#8217;lida&raquo;: buzilgan smartfonning asosiy belgilari nomlanadi\",\"datePublished\":\"2021-11-17T06:15:14+00:00\",\"dateModified\":\"2025-06-19T09:55:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/\"},\"wordCount\":176,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Depositphotos_73838981_XL-1.jpg\",\"articleSection\":[\"Yangiliklar\"],\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#respond\"]}],\"copyrightYear\":\"2021\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/\",\"name\":\"\\\"Hackerlar qo'lida\\\": buzilgan smartfonning asosiy belgilari nomlanadi | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Depositphotos_73838981_XL-1.jpg\",\"datePublished\":\"2021-11-17T06:15:14+00:00\",\"dateModified\":\"2025-06-19T09:55:17+00:00\",\"description\":\"\\\"Hackerlar qo'lida\\\": buzilgan smartfonning asosiy belgilari nomlanadi \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#breadcrumb\"},\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Depositphotos_73838981_XL-1.jpg\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Depositphotos_73838981_XL-1.jpg\",\"width\":900,\"height\":506,\"caption\":\"\\\"Hackerlar qo'lida\\\": buzilgan smartfonning asosiy belgilari nomlanadi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/bosh-sahifa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/category\\\/bez-kategorii\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"&#171;Hackerlar qo&#8217;lida&#187;: buzilgan smartfonning asosiy belgilari nomlanadi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"name\":\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz\",\"description\":\"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.\",\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"alternateName\":\"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"uz-UZ\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\",\"name\":\"\u041e\u041e\u041e Starlab\",\"alternateName\":\"Uzsoft.uz\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/uzsoft.uz\",\"https:\\\/\\\/x.com\\\/bws_info\",\"https:\\\/\\\/www.instagram.com\\\/uzsoft.uz\",\"https:\\\/\\\/www.pinterest.com\\\/starlabuz\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCqshldoZsm4jd9DScHqZhdQ\"],\"description\":\"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.\",\"legalName\":\"Starlab MCHJ\",\"foundingDate\":\"2016-11-15\",\"duns\":\"537716592\",\"leiCode\":\"894500IR5ZAAEGVJ4D53\",\"naics\":\"454110\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"},\"publishingPrinciples\":\"https:\\\/\\\/uzsoft.uz\\\/principy-publikatsii\\\/\",\"ownershipFundingInfo\":\"https:\\\/\\\/uzsoft.uz\\\/sobstvennost-i-finansirovanie\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-obratnoy-svyazi\\\/\",\"correctionsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-ispravleniy\\\/\",\"ethicsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-etiki\\\/\",\"diversityPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-raznoobraziya\\\/\",\"diversityStaffingReport\":\"https:\\\/\\\/uzsoft.uz\\\/otchet-o-kadrovom-raznoobrazii\\\/\",\"hasMerchantReturnPolicy\":{\"@type\":\"MerchantReturnPolicy\",\"applicableCountry\":\"UZ\",\"returnPolicyCategory\":\"https:\\\/\\\/schema.org\\\/MerchantReturnNotPermitted\",\"merchantReturnLink\":\"https:\\\/\\\/uzsoft.uz\\\/refund_returns\\\/\"},\"address\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"41.289614319763196\",\"longitude\":\"69.22166103901668\"},\"telephone\":[\"+998712001999\",\"+998712031999\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"telephone\":\"+998712001999\",\"email\":\"info@starlab.uz\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@starlab.uz\",\"faxNumber\":\"+998712001999\",\"areaServed\":\"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\",\"vatID\":\"326060121141\",\"taxID\":\"304426154\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#\\\/schema\\\/person\\\/b4211fdbf4859a7db7358ea60755f54a\",\"name\":\"BWS.Uz IT Technoligies\",\"description\":\"\u042d\u0442\u043e\u0442 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Starlab\",\"sameAs\":[\"https:\\\/\\\/starlab.uz\"]},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#local-main-place-address\",\"streetAddress\":\"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.\",\"addressLocality\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"postalCode\":\"100043\",\"addressRegion\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"addressCountry\":\"UZ\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"width\":233,\"height\":54,\"caption\":\"\u041e\u041e\u041e Starlab\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\" \/>\n<meta name=\"geo.position\" content=\"41.289614319763196;69.22166103901668\" \/>\n<meta name=\"geo.region\" content=\"O&#039;zbekiston\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","description":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/","og_locale":"uz_UZ","og_type":"article","og_title":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz","og_description":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.","og_url":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/","og_site_name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d","article_publisher":"https:\/\/www.facebook.com\/uzsoft.uz","article_published_time":"2021-11-17T06:15:14+00:00","article_modified_time":"2025-06-19T09:55:17+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg","type":"image\/jpeg"}],"author":"BWS.Uz IT Technoligies","twitter_card":"summary_large_image","twitter_creator":"@bws_info","twitter_site":"@bws_info","twitter_misc":{"Written by":"BWS.Uz IT Technoligies","Est. reading time":"1 daqiqa"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#article","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/"},"author":{"name":"BWS.Uz IT Technoligies","@id":"https:\/\/uzsoft.uz\/uz\/#\/schema\/person\/b4211fdbf4859a7db7358ea60755f54a"},"headline":"&laquo;Hackerlar qo&#8217;lida&raquo;: buzilgan smartfonning asosiy belgilari nomlanadi","datePublished":"2021-11-17T06:15:14+00:00","dateModified":"2025-06-19T09:55:17+00:00","mainEntityOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/"},"wordCount":176,"commentCount":0,"publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg","articleSection":["Yangiliklar"],"inLanguage":"uz-UZ","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#respond"]}],"copyrightYear":"2021","copyrightHolder":{"@id":"https:\/\/uzsoft.uz\/#organization"}},{"@type":"WebPage","@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/","url":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/","name":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#primaryimage"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg","datePublished":"2021-11-17T06:15:14+00:00","dateModified":"2025-06-19T09:55:17+00:00","description":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi \u2014 \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u0432 \u0440\u0443\u0431\u0440\u0438\u043a\u0435 Yangiliklar \u043d\u0430 Uzsoft.uz. \u0410\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u0442\u044c\u0438 \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445, \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u0430\u0445 \u0438 \u0418\u0422-\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","breadcrumb":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#breadcrumb"},"inLanguage":"uz-UZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/"]}]},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#primaryimage","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2021\/11\/Depositphotos_73838981_XL-1.jpg","width":900,"height":506,"caption":"\"Hackerlar qo'lida\": buzilgan smartfonning asosiy belgilari nomlanadi"},{"@type":"BreadcrumbList","@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/uzsoft.uz\/uz\/bosh-sahifa\/"},{"@type":"ListItem","position":2,"name":"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438","item":"https:\/\/uzsoft.uz\/uz\/category\/bez-kategorii\/"},{"@type":"ListItem","position":3,"name":"&#171;Hackerlar qo&#8217;lida&#187;: buzilgan smartfonning asosiy belgilari nomlanadi"}]},{"@type":"WebSite","@id":"https:\/\/uzsoft.uz\/uz\/#website","url":"https:\/\/uzsoft.uz\/uz\/","name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz","description":"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.","publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"alternateName":"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzsoft.uz\/uz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"uz-UZ"},{"@type":["Organization","Place"],"@id":"https:\/\/uzsoft.uz\/uz\/#organization","name":"\u041e\u041e\u041e Starlab","alternateName":"Uzsoft.uz","url":"https:\/\/uzsoft.uz\/uz\/","logo":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#local-main-organization-logo"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/uzsoft.uz","https:\/\/x.com\/bws_info","https:\/\/www.instagram.com\/uzsoft.uz","https:\/\/www.pinterest.com\/starlabuz","https:\/\/www.youtube.com\/channel\/UCqshldoZsm4jd9DScHqZhdQ"],"description":"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.","legalName":"Starlab MCHJ","foundingDate":"2016-11-15","duns":"537716592","leiCode":"894500IR5ZAAEGVJ4D53","naics":"454110","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"},"publishingPrinciples":"https:\/\/uzsoft.uz\/principy-publikatsii\/","ownershipFundingInfo":"https:\/\/uzsoft.uz\/sobstvennost-i-finansirovanie\/","actionableFeedbackPolicy":"https:\/\/uzsoft.uz\/politika-obratnoy-svyazi\/","correctionsPolicy":"https:\/\/uzsoft.uz\/politika-ispravleniy\/","ethicsPolicy":"https:\/\/uzsoft.uz\/politika-etiki\/","diversityPolicy":"https:\/\/uzsoft.uz\/politika-raznoobraziya\/","diversityStaffingReport":"https:\/\/uzsoft.uz\/otchet-o-kadrovom-raznoobrazii\/","hasMerchantReturnPolicy":{"@type":"MerchantReturnPolicy","applicableCountry":"UZ","returnPolicyCategory":"https:\/\/schema.org\/MerchantReturnNotPermitted","merchantReturnLink":"https:\/\/uzsoft.uz\/refund_returns\/"},"address":{"@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"41.289614319763196","longitude":"69.22166103901668"},"telephone":["+998712001999","+998712031999"],"contactPoint":{"@type":"ContactPoint","telephone":"+998712001999","email":"info@starlab.uz"},"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@starlab.uz","faxNumber":"+998712001999","areaServed":"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d","vatID":"326060121141","taxID":"304426154"},{"@type":"Person","@id":"https:\/\/uzsoft.uz\/uz\/#\/schema\/person\/b4211fdbf4859a7db7358ea60755f54a","name":"BWS.Uz IT Technoligies","description":"\u042d\u0442\u043e\u0442 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Starlab","sameAs":["https:\/\/starlab.uz"]},{"@type":"PostalAddress","@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#local-main-place-address","streetAddress":"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.","addressLocality":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","postalCode":"100043","addressRegion":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","addressCountry":"UZ"},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/hackerlar-qolida-buzilgan-smartfonning-asosiy-belgilari-nomlanadi\/#local-main-organization-logo","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","width":233,"height":54,"caption":"\u041e\u041e\u041e Starlab"}]},"geo.placename":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","geo.position":{"lat":"41.289614319763196","long":"69.22166103901668"},"geo.region":"O'zbekiston"},"_links":{"self":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/59530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/comments?post=59530"}],"version-history":[{"count":0,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/59530\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media\/54406"}],"wp:attachment":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media?parent=59530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/categories?post=59530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/tags?post=59530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}