{"id":61596,"date":"2019-03-17T20:10:06","date_gmt":"2019-03-17T15:10:06","guid":{"rendered":"https:\/\/uzsoft.uz\/esetning-ilgor-texnologiyalari\/"},"modified":"2019-03-17T20:10:06","modified_gmt":"2019-03-17T15:10:06","slug":"esetning-ilgor-texnologiyalari","status":"publish","type":"post","link":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/","title":{"rendered":"ESETning ilg&#8217;or texnologiyalari"},"content":{"rendered":"<h3 style=\"text-align: center;\">Ishonchli foydalanuvchi himoyasini ta&#8217;minlash uchun doimiy ravishda takomillashtirilmoqda<\/h3>\n<table style=\"height: 22px;\" width=\"716\">\n<tbody>\n<tr>\n<td style=\"width: 231px;\">\n<ul class=\"tick-list\">\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">UEFI skaneri<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">DNK imzolari<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Mashina obuchenie<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Bulutga asoslangan xavfsizlik tizimi<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Reputatsiya va kesh<\/a><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 231px;\">\n<ul class=\"tick-list\">\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Xulq-atvorga asoslangan tahdidlarni aniqlash va blokirovka qilish \u2013 HIPS<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">\u041f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u0430 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Kengaytirilgan xotira skanerlash<\/a><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 232px;\">\n<ul class=\"tick-list\">\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Ekspluatatsiyadan himoya qilish<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Ransomware himoyasi<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Tarmoq hujumlaridan himoya qilish<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BF%D0%B5%D1%80%D0%B5%D0%B4%D0%BE%D0%B2%D1%8B%D0%B5-%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B8-eset\">Botnet himoyasi<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"text-align: center;\">ESET texnologiyalari<\/h2>\n<h2 class=\"technology-intro__title\" style=\"text-align: center;\">ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya qilish uchun noyob texnologiyalarni ishlab chiqmoqda.<\/h2>\n<div class=\"technology-intro__text\" style=\"text-align: center;\">ESET yechimlari standart antivirus dasturlarining imkoniyatlaridan tashqariga chiqadigan ko&#8217;p qatlamli himoya texnologiyalaridan foydalanadi. Quyidagi rasmda ESETning asosiy texnologiyalari va ular tahdidlarni qachon va qanday aniqlashi va\/yoki bloklashi baholangan. <\/div>\n<div><\/div>\n<div><img decoding=\"async\" class=\"aligncenter size-full wp-image-39156\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/schema.jpg\" alt=\"ESETning ilg'or texnologiyalari\" width=\"958\" height=\"587\" srcset=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/schema.jpg 958w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/schema-600x368.jpg 600w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/schema-768x471.jpg 768w, https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/schema-433x265.jpg 433w\" sizes=\"(max-width: 958px) 100vw, 958px\" \/><\/div>\n<div><\/div>\n<div style=\"text-align: center;\"><a href=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/ESET-Technology.pdf\">Texnologiya tavsifini yuklab oling<\/a><\/div>\n<div><\/div>\n<div>\n<table style=\"height: 21px;\" width=\"740\">\n<tbody>\n<tr>\n<td style=\"width: 362px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39158\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-01.png\" alt=\"\" width=\"300\" height=\"300\"><\/td>\n<td style=\"width: 362px;\">\n<h3 class=\"technology-directions__title\">UEFI Skaneri<\/h3>\n<div class=\"technology-directions__text\">\n<p>ESET o\u02bbzining UEFI (Unified Extensible Firmware Interface) dasturiy ta\u02bcminotiga qo\u02bbshimcha himoya qatlamini integratsiya qilgan birinchi antivirus ishlab chiqaruvchisi bo\u02bbldi. &laquo;UEFI Scanner&raquo; funksiyasi UEFI spetsifikatsiyasiga mos keladigan yuklashdan oldingi muhitning xavfsizligini tekshiradi va ta\u02bcminlaydi. U dasturiy ta\u02bcminot yaxlitligini kuzatish va o\u02bbzgartirish urinishlarini aniqlash uchun mo\u02bbljallangan.  <\/p>\n<\/div>\n<p>UEFI &#8211; bu qurilmaning operatsion tizimi va past darajadagi apparat funktsiyalarini boshqaradigan dasturiy ta&#8217;minot o&#8217;rtasidagi dasturiy interfeys uchun standartlashtirilgan spetsifikatsiya. UEFI 1970-yillarning o&#8217;rtalaridan beri kompyuterlarda qo&#8217;llanilgan BIOS (Asosiy kirish\/chiqish tizimi) o&#8217;rnini egalladi. <\/p>\n<p>Spetsifikatsiya yaxshi hujjatlashtirilgan bo&#8217;lib, ishlab chiquvchilarga dasturiy ta&#8217;minot kengaytmalarini yaratishga imkon beradi. Biroq, bu zararli dastur yaratuvchilari uchun UEFIga zararli modullar va kodlarni kiritish imkoniyatini ham ochadi. <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li>ESET NOD32 Internet Security<\/li>\n<li>ESET NOD32 antivirus<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 30px;\" width=\"741\">\n<tbody>\n<tr>\n<td style=\"width: 362px;\">\n<h3 class=\"technology-directions__title\">DNK IMZOLARI<\/h3>\n<div class=\"technology-directions__text\">\n<p>Tahdidlarni aniqlash turlari zararli obyektning xatti-harakati va xususiyatlari haqida ma&#8217;lumot to&#8217;plami bo&#8217;lgan ma&#8217;lum xeshlardan tortib DNK imzolarigacha bo&#8217;lgan turlarni o&#8217;z ichiga oladi.<\/p>\n<p>Zararli kodni o&#8217;zgartirish yoki chalkashtirib yuborish mumkin bo&#8217;lsa-da, uning xatti-harakatlarini o&#8217;zgartirish oson emas. ESETning DNK imzolari shuni yodda tutgan holda ishlab chiqilgan. <\/p>\n<\/div>\n<p>Antivirus chuqur kod tahlilini o&#8217;tkazadi va zararli dasturlarning xatti-harakatlari uchun mas&#8217;ul bo&#8217;lgan &laquo;genlar&raquo;ni ajratib oladi. Ushbu xulq-atvor genlari DNK imzolarini yaratish uchun ishlatiladi, ular diskda topilgan yoki xotirada ishlayotgan potentsial shubhali kodni jarayon sifatida baholash uchun ishlatiladi. <\/p>\n<p>DNK imzolari ma&#8217;lum zararli dasturlar namunalarini, ma&#8217;lum zararli dasturlar oilalarining yangi variantlarini yoki zararli xatti-harakatlarni ko&#8217;rsatadigan genlarni o&#8217;z ichiga olgan ilgari noma&#8217;lum bo&#8217;lgan zararli dasturlarni aniqlay oladi.<\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BA%D0%B0%D1%82%D0%B5%D0%B3%D0%BE%D1%80%D0%B8%D1%8F-%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B0\/%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D1%8B\/esetnod32\/\" target=\"_blank\" rel=\"noopener noreferrer\">Uy uchun barcha ESET NOD32 mahsulotlari<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/antivirus-eset-dlja-biznesa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Biznes uchun barcha ESET mahsulotlari<\/a><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 363px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39159\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-02.png\" alt=\"\" width=\"300\" height=\"300\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 20px;\" width=\"741\">\n<tbody>\n<tr>\n<td style=\"width: 362px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39160\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-03.png\" alt=\"\" width=\"300\" height=\"300\"><\/td>\n<td style=\"width: 363px;\">\n<h3 class=\"technology-directions__title\">Mashinada o&#8217;rganish<\/h3>\n<div class=\"technology-directions__text\">\n<p>ESET ESET Augur deb nomlangan maxsus mashina o&#8217;rganish dvigatelini ishlab chiqdi. U neyron tarmoqlarining (masalan, chuqur o&#8217;rganish va LSTM (uzoq muddatli qisqa muddatli xotira) tarmoqlari) va oltita tasniflash algoritmlari guruhining birlashgan kuchidan foydalanadi. Bu unga konsolidatsiyalangan natijani yaratish va kiruvchi namunani toza, potentsial ravishda kiruvchi yoki zararli deb to&#8217;g&#8217;ri belgilashga yordam beradi.  <\/p>\n<p>ESET Augur dvigateli eng yaxshi aniqlash tezligini va minimal soxta ijobiy natijalarni ta&#8217;minlash uchun DNK imzolari, sinov muhitida ishlash, xotira tahlili va xulq-atvor xususiyatlarini ajratib olish kabi boshqa xavfsizlik texnologiyalari bilan birgalikda ishlashga sozlangan.<\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BA%D0%B0%D1%82%D0%B5%D0%B3%D0%BE%D1%80%D0%B8%D1%8F-%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B0\/%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D1%8B\/esetnod32\/\" target=\"_blank\" rel=\"noopener noreferrer\">Uy uchun barcha ESET NOD32 mahsulotlari<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/antivirus-eset-dlja-biznesa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Biznes uchun barcha ESET mahsulotlari<\/a><\/li>\n<\/ul>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 5px;\" width=\"740\">\n<tbody>\n<tr>\n<td style=\"width: 362px;\">\n<h3 class=\"technology-directions__title\">BULUTLI XAVFSIZLIK TIZIMI<\/h3>\n<div class=\"technology-directions__text\">\n<p>Bulutga asoslangan himoya tizimi ESET LiveGrid texnologiyasi asosida qurilgan. Foydalanuvchi ruxsati bilan tizim potentsial, ilgari noma&#8217;lum bo&#8217;lgan tahdidlarni kuzatib boradi va ularni ESET LiveGrid fikr-mulohaza tizimi orqali ESET bulutiga xabar beradi. <\/p>\n<p>To&#8217;plangan namunalar avtomatik sinov muhiti emulyatsiyasi va xulq-atvor tahlilidan o&#8217;tadi, natijada zararli xususiyatlar tasdiqlansa, avtomatlashtirilgan imzolar yaratiladi. ESET foydalanuvchilari keyingi zararli dasturlar bazasi yangilanishidan oldin namunaning obro&#8217;si haqida fikr-mulohaza oladilar. <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BA%D0%B0%D1%82%D0%B5%D0%B3%D0%BE%D1%80%D0%B8%D1%8F-%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B0\/%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D1%8B\/esetnod32\/\" target=\"_blank\" rel=\"noopener noreferrer\">Uy uchun barcha ESET NOD32 mahsulotlari<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/antivirus-eset-dlja-biznesa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Biznes uchun barcha ESET mahsulotlari<\/a><\/li>\n<\/ul>\n<\/div>\n<\/td>\n<td style=\"width: 362px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39161\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-04.png\" alt=\"\" width=\"300\" height=\"300\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 31px;\" width=\"739\">\n<tbody>\n<tr>\n<td style=\"width: 361px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39162\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-05.png\" alt=\"OB-UQUV VA NAQD PUL\" width=\"300\" height=\"300\"><\/td>\n<td style=\"width: 362px;\">\n<h3 class=\"technology-directions__title\">OB-UQUV VA NAQD PUL<\/h3>\n<div class=\"technology-directions__text\">\n<p>Skanerlashdan oldin, mahsulotlarimiz mahalliy fayl keshini yoki URL manzilini ma&#8217;lum tahdidlar uchun tekshiradi. Keyin obyekt ESETning qora ro&#8217;yxati va oq ro&#8217;yxati ma&#8217;lumotlar bazasi bilan taqqoslanadi. Bu tahdidlarni skanerlash tezligini oshiradi.  <\/p>\n<p>Keyin, ESET LiveGrid bulut tizimi obyektning obro&#8217;si haqida ma&#8217;lumot so&#8217;raydi \u2014 u ilgari shubhali deb belgilanganmi yoki zararli deb tasniflanganmi. Bu skanerlash samaradorligini oshiradi va zararli dasturlar ma&#8217;lumotlarini foydalanuvchilarimiz bilan tezroq almashishni ta&#8217;minlaydi. <\/p>\n<p>URL qora ro&#8217;yxati va obro&#8217;sini tekshirish foydalanuvchilarni firibgar (fishing) saytlar yoki zararli kontentga ega resurslardan himoya qiladi.<\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BA%D0%B0%D1%82%D0%B5%D0%B3%D0%BE%D1%80%D0%B8%D1%8F-%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B0\/%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D1%8B\/esetnod32\/\" target=\"_blank\" rel=\"noopener noreferrer\">Uy uchun barcha ESET NOD32 mahsulotlari<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/antivirus-eset-dlja-biznesa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Biznes uchun barcha ESET mahsulotlari<\/a><\/li>\n<\/ul>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 15px;\" width=\"739\">\n<tbody>\n<tr>\n<td style=\"width: 361px;\">\n<h3 class=\"technology-directions__title\">Xulq-atvor tahdidini aniqlash va blokirovka qilish \u2013 HIPS<\/h3>\n<div class=\"technology-directions__text\">\n<p>ESETning HIPS yoki buzg&#8217;unchilikning oldini olish tizimi shubhali xatti-harakatlarni aniqlash uchun oldindan belgilangan qoidalar to&#8217;plamidan foydalangan holda tizim faoliyatini kuzatib boradi. Shubhali faoliyat aniqlanganda, HIPS o&#8217;zini himoya qilish mexanizmi kiruvchi dastur yoki jarayonning potentsial zararli harakatlarini to&#8217;xtatadi. <\/p>\n<p>Foydalanuvchilar standart qoidalar to&#8217;plami o&#8217;rniga o&#8217;zlarining qoidalar to&#8217;plamini belgilashlari mumkin, ammo buning uchun ilovalar va operatsion tizim qanday ishlashi haqida ilg&#8217;or bilim talab etiladi.<\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li><a href=\"https:\/\/uzsoft.uz\/shop\/eset-nod32-%d0%b0%d0%bd%d1%82%d0%b8%d0%b2%d0%b8%d1%80%d1%83%d1%81-1-%d0%b3%d0%be%d0%b4-%d0%bd%d0%b0-1-%d0%bf%d0%ba\/\" target=\"_blank\" rel=\"noopener noreferrer\">ESET NOD32 Internet Security<\/a><\/li>\n<li>ESET Endpoint Security \u0434\u043b\u044f Microsoft Windows<\/li>\n<\/ul>\n<\/div>\n<\/td>\n<td style=\"width: 362px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39163\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-06.png\" alt=\"Xulq-atvor tahdidini aniqlash va blokirovka qilish \u2013 HIPS\" width=\"300\" height=\"300\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 30px;\" width=\"737\">\n<tbody>\n<tr>\n<td style=\"width: 360px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39164\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-07.png\" alt=\"MAHSULOTDAGI QUM QUTISI\" width=\"300\" height=\"300\"><\/td>\n<td style=\"width: 361px;\">\n<h3 class=\"technology-directions__title\">MAHSULOTDAGI QUM QUTISI<\/h3>\n<div class=\"technology-directions__text\">\n<p>Zamonaviy zararli dastur mualliflari ko&#8217;pincha antivirus dasturlari tomonidan aniqlanmaslik uchun o&#8217;z kodlarini chalkashtirishga yoki haqiqiy xatti-harakatlarini yashirishga harakat qilishadi. Tahdidning haqiqiy xatti-harakatlarini aniqlash uchun ESET yechimlari izolyatsiya qilingan muhitdan &#8211; &laquo;sandbox&raquo; deb ataladigan narsadan foydalanadi. Ushbu texnologiyadan foydalangan holda, antivirus shubhali namunani izolyatsiya qilingan virtual muhitda ishga tushirish uchun turli tizim komponentlarini taqlid qiladi.  <\/p>\n<p>Ikkilik tarjimalar mashinaning sekinlashuvining oldini olish uchun ishlatiladi. Ushbu texnologiya ESET yechimlarida 1995-yilda joriy etilgan. O&#8217;shandan beri biz uni doimiy ravishda takomillashtirish ustida ishlamoqdamiz.  <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li><a href=\"https:\/\/uzsoft.uz\/%D0%BA%D0%B0%D1%82%D0%B5%D0%B3%D0%BE%D1%80%D0%B8%D1%8F-%D0%BF%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82%D0%B0\/%D0%B0%D0%BD%D1%82%D0%B8%D0%B2%D0%B8%D1%80%D1%83%D1%81%D1%8B\/esetnod32\/\" target=\"_blank\" rel=\"noopener noreferrer\">Uy uchun barcha ESET NOD32 mahsulotlari<\/a><\/li>\n<li><a href=\"https:\/\/uzsoft.uz\/antivirus-eset-dlja-biznesa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Biznes uchun barcha ESET mahsulotlari<\/a><\/li>\n<\/ul>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 23px;\" width=\"736\">\n<tbody>\n<tr>\n<td style=\"width: 360px;\">\n<h3 class=\"technology-directions__title\">KENGAYTIRILGAN XOTIRA SCANERLASH<\/h3>\n<div class=\"technology-directions__text\">\n<p>Advanced Memory Scanning &#8211; bu foydalanuvchining xabarisiz kompyuterga kirib boradigan murakkab shifrlangan zararli dasturlarni samarali ravishda zararsizlantiradigan innovatsion texnologiya. Ushbu xususiyat zararli jarayonlarning xatti-harakatlarini kuzatib boradi va ularni xotirada ishga tushirilishi bilanoq skanerlaydi. <\/p>\n<p>Har safar jarayon tizimdan yangi bajariladigan fayl uchun so&#8217;rov yuborganida, Advanced Memory Scanning DNK imzolari yordamida xatti-harakatlarni tahlil qiladi. Aqlli keshlash tufayli bu xususiyat resurslarni sarflash yoki kompyuterning ishlashiga deyarli hech qanday ta&#8217;sir ko&#8217;rsatmaydi. <\/p>\n<p>Zamonaviy zararli dastur kodi fayl tizimida doimiy komponentlardan foydalanmasdan &laquo;faqat xotirada&raquo; ishlashi mumkin. Ushbu kodni standart aniqlash usullari bilan aniqlab bo&#8217;lmaydi. Faqat xotirani skanerlash bunday kiberhujumlarni aniqlay oladi va ESETning Advanced Memory Scan ularga qarshi kurashish uchun samarali vositadir.  <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li>ESET NOD32 Internet Security<\/li>\n<li>ESET NOD32 antivirus<\/li>\n<li>ESET Endpoint Security \u0434\u043b\u044f Microsoft Windows<\/li>\n<li>ESET Endpoint Antivirus \u0434\u043b\u044f Microsoft Windows<\/li>\n<\/ul>\n<\/div>\n<\/td>\n<td style=\"width: 360px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39165\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-08.png\" alt=\"KENGAYTIRILGAN XOTIRA SCANERLASH\" width=\"300\" height=\"300\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 18px;\" width=\"734\">\n<tbody>\n<tr>\n<td style=\"width: 359px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39166\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-09.png\" alt=\"\" width=\"300\" height=\"300\"><\/td>\n<td style=\"width: 359px;\">\n<h3 class=\"technology-directions__title\">FOYDALANISH HIMOYASI<\/h3>\n<div class=\"technology-directions__text\">\n<p>Ekspluatatsiyadan himoya qilish tez-tez ekspluatatsiya qilinadigan ilovalarni (veb-brauzerlar, PDF muharrirlari, elektron pochta mijozlari, Microsoft Office ilovalari, Flash, Java va boshqalar) kuzatib boradi. U nafaqat ma&#8217;lum <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CVE identifikatorlarini<\/a> qidiradi, balki ekspluatatsiya usullariga ham e&#8217;tibor qaratadi. Shubhali xatti-harakatlarni ko&#8217;rsatadigan har qanday obyekt tahlil qilinadi va zararli jarayon darhol qurilmada bloklanadi.  <\/p>\n<p>Ekspluatatsiyadan himoya qilish texnologiyasi ekspluatatsiyani bloklaydi \u2014 buzilgan fayllardagi ekspluatatsiyalarni aniqlaydigan skanerlash mexanizmlaridan yoki aloqa qatlamini nishonga oluvchi tarmoq hujumidan himoya qilishdan farqli o&#8217;laroq. Texnologiya yangi ekspluatatsiya usullaridan foydalanadigan yangi ekspluatatsiyani aniqlash usullari orqali doimiy ravishda takomillashtirilmoqda. <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li>ESET NOD32 Internet Security<\/li>\n<li>ESET NOD32 antivirus<\/li>\n<li>ESET Endpoint Security \u0434\u043b\u044f Microsoft Windows<\/li>\n<li>Microsoft Windows uchun ESET Endpoint Antivirus<\/li>\n<\/ul>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 30px;\" width=\"732\">\n<tbody>\n<tr>\n<td style=\"width: 358px;\">\n<h3 class=\"technology-directions__title\">TO&#8217;LOVCHI DASTURLARDAN HIMOYA<\/h3>\n<div class=\"technology-directions__text\">\n<p>Ushbu texnologiya foydalanuvchi ma&#8217;lumotlariga kirishni bloklaydigan yoki shifrlaydigan hamda fayllarni &laquo;ozod qilish&raquo; uchun tovon puli talab qiladigan dasturlardan qo&#8217;shimcha himoya qatlamini ta&#8217;minlaydi. To&#8217;lov dasturlari himoyasi barcha bajariladigan ilovalarni xulq-atvor tahlili va obro&#8217; evristikasi yordamida baholaydi va kuzatib boradi. <\/p>\n<p>Ushbu texnologiya sukut bo&#8217;yicha yoqilgan. Agar kompyuterda shubhali faoliyat aniqlansa, foydalanuvchidan uni bloklash so&#8217;raladi. Bunday zararli dasturlardan maksimal darajada himoya qilish Ransomware Protection, Network Attack Protection, DNA Signature va bulutga asoslangan himoya tizimidan birgalikda foydalanish orqali amalga oshiriladi.  <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li>ESET NOD32 Internet Security<\/li>\n<\/ul>\n<\/div>\n<\/td>\n<td style=\"width: 358px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39167\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-10.png\" alt=\"TO'LOVCHI DASTURLARDAN HIMOYA\" width=\"300\" height=\"300\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 24px;\" width=\"731\">\n<tbody>\n<tr>\n<td style=\"width: 357px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39168\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-11.png\" alt=\"TARMOQ HUJUMLARIDAN HIMOYA\" width=\"300\" height=\"288\"><\/td>\n<td style=\"width: 358px;\">\n<h3 class=\"technology-directions__title\">\u0417\u0410\u0429\u0418\u0422\u0410 \u041e\u0422 \u0421\u0415\u0422\u0415\u0412\u042b\u0425 \u0410\u0422\u0410\u041a<\/h3>\n<div class=\"technology-directions__text\">\n<p>Bu xususiyat xavfsizlik devorining imkoniyatlarini kengaytiradi va tarmoq darajasida ma&#8217;lum zaifliklarni aniqlashni yaxshilaydi. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Server_Message_Block\" target=\"_blank\" rel=\"noopener noreferrer\">SMB,<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/Remote_procedure_call\" target=\"_blank\" rel=\"noopener noreferrer\">RPC<\/a> va <a href=\"https:\/\/en.wikipedia.org\/wiki\/Remote_Desktop_Protocol\" target=\"_blank\" rel=\"noopener noreferrer\">RDP<\/a> kabi keng qo&#8217;llaniladigan protokollardagi keng tarqalgan zaifliklarni aniqlash zararli dasturlardan, tarmoq hujumlaridan va yamalar hali chiqarilmagan yoki o&#8217;rnatilmagan zaifliklardan foydalanishdan himoya qilishning muhim qatlamini ta&#8217;minlaydi. <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li>ESET NOD32 Internet Security<\/li>\n<li>ESET Endpoint Security \u0434\u043b\u044f Microsoft Windows<\/li>\n<\/ul>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"height: 11px;\" width=\"731\">\n<tbody>\n<tr>\n<td style=\"width: 357px;\">\n<h3 class=\"technology-directions__title\">BOTNETLARDAN HIMOYA<\/h3>\n<div class=\"technology-directions__text\">\n<p>Botnet himoyasi tarmoq faolligini kuzatishga va botnetlar tomonidan ishlatiladigan zararli ulanishlarni aniqlashga yordam beradi. Texnologiya ma&#8217;lum zararli kod namunalari uchun chiquvchi tarmoq ulanishlarini aniqlaydi va o&#8217;zining qora ro&#8217;yxatlaridan foydalangan holda zararli veb-saytlarni aniqlaydi. Ushbu xususiyat har bir aniqlangan zararli ulanishni bloklaydi va foydalanuvchiga xabar beradi.  <\/p>\n<h4>Texnologiya quyidagi mahsulotlarda qo&#8217;llaniladi:<\/h4>\n<ul>\n<li>ESET NOD32 Internet Security<\/li>\n<li>ESET Endpoint Security \u0434\u043b\u044f Microsoft Windows<\/li>\n<\/ul>\n<\/div>\n<\/td>\n<td style=\"width: 358px;\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-39169\" src=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/icon-direction-12.png\" alt=\"BOTNETLARDAN HIMOYA\" width=\"300\" height=\"288\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ishonchli foydalanuvchi himoyasini ta&#8217;minlash uchun doimiy ravishda takomillashtirilmoqda UEFI skaneri DNK imzolari Mashina obuchenie Bulutga asoslangan xavfsizlik tizimi Reputatsiya va kesh Xulq-atvorga asoslangan tahdidlarni aniqlash va blokirovka qilish \u2013 HIPS \u041f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u0430 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 Kengaytirilgan xotira skanerlash Ekspluatatsiyadan himoya qilish Ransomware himoyasi Tarmoq hujumlaridan himoya qilish Botnet himoyasi ESET texnologiyalari ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":53038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"ESETning ilg'or texnologiyalari","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"%%title%% - ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya qilish uchun noyob texnologiyalarni ishlab chiqmoqda!","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_schema_page_type":"","_yoast_wpseo_schema_article_type":"","footnotes":""},"categories":[1],"tags":[56119,56117,56118,56120],"class_list":["post-61596","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii","tag-eset-livegrid-bulut-texnologiyalari","tag-eset-texnologiyalari-2","tag-eset-texnologiyalari-nima","tag-esetning-ilgor-texnologiyalari"],"featured_image_src":{"landsacpe":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg",847,445,false],"list":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg",463,243,false],"medium":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general-300x158.jpg",300,158,true],"full":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg",1024,538,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ESETning ilg&#039;or texnologiyalari | \u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz<\/title>\n<meta name=\"description\" content=\"ESETning ilg&#039;or texnologiyalari - ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya qilish uchun noyob texnologiyalarni ishlab chiqmoqda!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/\" \/>\n<meta property=\"og:locale\" content=\"uz_UZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESETning ilg&#039;or texnologiyalari | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz\" \/>\n<meta property=\"og:description\" content=\"ESETning ilg&#039;or texnologiyalari \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/\" \/>\n<meta property=\"og:site_name\" content=\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzsoft.uz\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-17T15:10:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bws_info\" \/>\n<meta name=\"twitter:site\" content=\"@bws_info\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 daqiqa\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"ESETning ilg&#8217;or texnologiyalari\",\"datePublished\":\"2019-03-17T15:10:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/\"},\"wordCount\":1350,\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/general.jpg\",\"keywords\":[\"ESET LiveGrid bulut texnologiyalari\",\"ESET texnologiyalari\",\"ESET texnologiyalari nima?\",\"ESETning ilg'or texnologiyalari\"],\"articleSection\":[\"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438\"],\"inLanguage\":\"uz-UZ\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/\",\"name\":\"ESETning ilg'or texnologiyalari | \u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/general.jpg\",\"datePublished\":\"2019-03-17T15:10:06+00:00\",\"description\":\"ESETning ilg'or texnologiyalari - ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya qilish uchun noyob texnologiyalarni ishlab chiqmoqda!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#breadcrumb\"},\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/general.jpg\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/general.jpg\",\"width\":1024,\"height\":538,\"caption\":\"ESETning ilg'or texnologiyalari\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/category\\\/bez-kategorii\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ESETning ilg&#8217;or texnologiyalari\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"name\":\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz\",\"description\":\"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.\",\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"alternateName\":\"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"uz-UZ\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\",\"name\":\"\u041e\u041e\u041e Starlab\",\"alternateName\":\"Uzsoft.uz\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/uzsoft.uz\",\"https:\\\/\\\/x.com\\\/bws_info\",\"https:\\\/\\\/www.instagram.com\\\/uzsoft.uz\",\"https:\\\/\\\/www.pinterest.com\\\/starlabuz\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCqshldoZsm4jd9DScHqZhdQ\"],\"description\":\"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.\",\"legalName\":\"Starlab MCHJ\",\"foundingDate\":\"2016-11-15\",\"duns\":\"537716592\",\"leiCode\":\"894500IR5ZAAEGVJ4D53\",\"naics\":\"454110\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"},\"publishingPrinciples\":\"https:\\\/\\\/uzsoft.uz\\\/principy-publikatsii\\\/\",\"ownershipFundingInfo\":\"https:\\\/\\\/uzsoft.uz\\\/sobstvennost-i-finansirovanie\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-obratnoy-svyazi\\\/\",\"correctionsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-ispravleniy\\\/\",\"ethicsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-etiki\\\/\",\"diversityPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-raznoobraziya\\\/\",\"diversityStaffingReport\":\"https:\\\/\\\/uzsoft.uz\\\/otchet-o-kadrovom-raznoobrazii\\\/\",\"hasMerchantReturnPolicy\":{\"@type\":\"MerchantReturnPolicy\",\"merchantReturnLink\":\"https:\\\/\\\/uzsoft.uz\\\/refund_returns\\\/\"},\"address\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"41.289614319763196\",\"longitude\":\"69.22166103901668\"},\"telephone\":[\"+998712001999\",\"+998712031999\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"telephone\":\"+998712001999\",\"email\":\"info@starlab.uz\"},\"openingHoursSpecification\":{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"23:59\"},\"email\":\"info@starlab.uz\",\"faxNumber\":\"+998712001999\",\"areaServed\":\"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\",\"vatID\":\"326060121141\",\"taxID\":\"304426154\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#local-main-place-address\",\"streetAddress\":\"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.\",\"addressLocality\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"postalCode\":\"100043\",\"addressRegion\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"addressCountry\":\"UZ\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/esetning-ilgor-texnologiyalari\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"width\":233,\"height\":54,\"caption\":\"\u041e\u041e\u041e Starlab\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\" \/>\n<meta name=\"geo.position\" content=\"41.289614319763196;69.22166103901668\" \/>\n<meta name=\"geo.region\" content=\"O&#039;zbekiston\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ESETning ilg'or texnologiyalari | \u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","description":"ESETning ilg'or texnologiyalari - ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya qilish uchun noyob texnologiyalarni ishlab chiqmoqda!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/","og_locale":"uz_UZ","og_type":"article","og_title":"ESETning ilg'or texnologiyalari | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz","og_description":"ESETning ilg'or texnologiyalari \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.","og_url":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/","og_site_name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d","article_publisher":"https:\/\/www.facebook.com\/uzsoft.uz","article_published_time":"2019-03-17T15:10:06+00:00","og_image":[{"width":1024,"height":538,"url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@bws_info","twitter_site":"@bws_info","twitter_misc":{"Est. reading time":"6 daqiqa"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#article","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/"},"author":{"name":"","@id":""},"headline":"ESETning ilg&#8217;or texnologiyalari","datePublished":"2019-03-17T15:10:06+00:00","mainEntityOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/"},"wordCount":1350,"publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg","keywords":["ESET LiveGrid bulut texnologiyalari","ESET texnologiyalari","ESET texnologiyalari nima?","ESETning ilg'or texnologiyalari"],"articleSection":["\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438"],"inLanguage":"uz-UZ","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/uzsoft.uz\/#organization"}},{"@type":"WebPage","@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/","url":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/","name":"ESETning ilg'or texnologiyalari | \u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#primaryimage"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg","datePublished":"2019-03-17T15:10:06+00:00","description":"ESETning ilg'or texnologiyalari - ESET tadqiqot laboratoriyalari zamonaviy tahdidlardan himoya qilish uchun noyob texnologiyalarni ishlab chiqmoqda!","breadcrumb":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#breadcrumb"},"inLanguage":"uz-UZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/"]}]},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#primaryimage","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2019\/03\/general.jpg","width":1024,"height":538,"caption":"ESETning ilg'or texnologiyalari"},{"@type":"BreadcrumbList","@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/uzsoft.uz\/uz\/"},{"@type":"ListItem","position":2,"name":"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438","item":"https:\/\/uzsoft.uz\/uz\/category\/bez-kategorii\/"},{"@type":"ListItem","position":3,"name":"ESETning ilg&#8217;or texnologiyalari"}]},{"@type":"WebSite","@id":"https:\/\/uzsoft.uz\/uz\/#website","url":"https:\/\/uzsoft.uz\/uz\/","name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz","description":"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.","publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"alternateName":"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzsoft.uz\/uz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"uz-UZ"},{"@type":["Organization","Place"],"@id":"https:\/\/uzsoft.uz\/uz\/#organization","name":"\u041e\u041e\u041e Starlab","alternateName":"Uzsoft.uz","url":"https:\/\/uzsoft.uz\/uz\/","logo":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#local-main-organization-logo"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/uzsoft.uz","https:\/\/x.com\/bws_info","https:\/\/www.instagram.com\/uzsoft.uz","https:\/\/www.pinterest.com\/starlabuz","https:\/\/www.youtube.com\/channel\/UCqshldoZsm4jd9DScHqZhdQ"],"description":"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.","legalName":"Starlab MCHJ","foundingDate":"2016-11-15","duns":"537716592","leiCode":"894500IR5ZAAEGVJ4D53","naics":"454110","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"},"publishingPrinciples":"https:\/\/uzsoft.uz\/principy-publikatsii\/","ownershipFundingInfo":"https:\/\/uzsoft.uz\/sobstvennost-i-finansirovanie\/","actionableFeedbackPolicy":"https:\/\/uzsoft.uz\/politika-obratnoy-svyazi\/","correctionsPolicy":"https:\/\/uzsoft.uz\/politika-ispravleniy\/","ethicsPolicy":"https:\/\/uzsoft.uz\/politika-etiki\/","diversityPolicy":"https:\/\/uzsoft.uz\/politika-raznoobraziya\/","diversityStaffingReport":"https:\/\/uzsoft.uz\/otchet-o-kadrovom-raznoobrazii\/","hasMerchantReturnPolicy":{"@type":"MerchantReturnPolicy","merchantReturnLink":"https:\/\/uzsoft.uz\/refund_returns\/"},"address":{"@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"41.289614319763196","longitude":"69.22166103901668"},"telephone":["+998712001999","+998712031999"],"contactPoint":{"@type":"ContactPoint","telephone":"+998712001999","email":"info@starlab.uz"},"openingHoursSpecification":{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"00:00","closes":"23:59"},"email":"info@starlab.uz","faxNumber":"+998712001999","areaServed":"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d","vatID":"326060121141","taxID":"304426154"},{"@type":"PostalAddress","@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#local-main-place-address","streetAddress":"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.","addressLocality":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","postalCode":"100043","addressRegion":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","addressCountry":"UZ"},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/esetning-ilgor-texnologiyalari\/#local-main-organization-logo","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","width":233,"height":54,"caption":"\u041e\u041e\u041e Starlab"}]},"geo.placename":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","geo.position":{"lat":"41.289614319763196","long":"69.22166103901668"},"geo.region":"O'zbekiston"},"_links":{"self":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/61596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/comments?post=61596"}],"version-history":[{"count":0,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/61596\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media\/53038"}],"wp:attachment":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media?parent=61596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/categories?post=61596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/tags?post=61596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}