WordPress Plugins. Top 10

WordPress Plugins. Top 10

Here is best WordPress Plugins list you must have.

Jetpack by WordPress.com


Jetpack is a simple and powerful plugin that enables all
of the power and flexibility you need from your WordPress.

Jetpack tells you how many visits your site gets and helps you get more traffic with tools like Related Posts, Publicize, Enhanced Distribution, and Sharing.

Jetpack protects your site against brute force attacks and unauthorised logins. We also monitor your site for downtime and keep your plugins updated.

Jetpack automatically optimizes and speeds up images using the global WordPress.com content delivery network. This saves you hosting costs by reducing bandwidth.

Jetpack includes other features that help you customize your site including Custom CSS, Contact Forms, Galleries and Carousels, Notifications and Subscriptions, Configurable Widgets, and many more…



All In One WP Security & Firewall


WordPress itself is a very secure platform. However, it helps to add some extra security and firewall to your site by using a security plugin that enforces a lot of good security practices.

The All In One WordPress Security plugin will take your website security to a whole new level.

It reduces security risk by checking for

vulnerabilities, and by implementing and enforcing the latest recommended WordPress security practices and techniques.

 All In One WP Security also uses an unprecedented security points grading system to measure how well you are protecting your site based on the security features you have activated.

Yoast SEO


Improve your WordPress SEO: Write better content and have a fully optimized WordPress site using Yoast SEO plugin.

Using the snippet preview you can see a rendering of what your post or page will look like in the search results, whether your title is too long or too short and your meta description makes sense in the context of a search result. This way the plugin will help you not only increase rankings but also increase the click through for organic search results.

Google Analytics


Very simple plugin, enables google analytics on all pages.



Best TOP 10 WordPress Plugins

How to Connect to Linux with Windows Remote Desktop RDP


You can connect to Linux machine from Windows using standard Windows Remote Desktop Connection (RDP)


$ apt-get install xrdp
$ systemctl enable xrdp
$ systemctl start xrdp



$ yum install epel-release
$ yum install xrdp tigervnc-server tigervnc-server-module
$ chcon -t bin_t /usr/sbin/xrdp
$ chcon -t bin_t /usr/sbin/xrdp-sesman
$ systemctl enable xrdp
$ systemctl start xrdp

Do not forget open port 3389 on Linux, Remote Desktop requires TCP port 3389

Configure One to One NAT in SonicWALL

One to One NAT (1:1 NAT )allows you to translate an internal IP address into a unique IP address.

1 Create 2 Address Objects

One for Server IP on LAN and another for Public IP of the server

Go to Network > Address Objects.


2 Create NAT Policy

This policy allows you to translate an external public IP address into an internal private IP address.

Go to the ‘Network > NAT Policies page, Click the Add button

Inbound NAT Policy

Original Source: Any
Translated Source:
Original Destination: Mywebserver Public
Translated Destination:
Mywebserver Private
Original Service:
Translated Service:
Inbound Interface: Any
Outbound Interface:
Comment: Webserver behind SonicWALL.
Enable NAT Policy:
Create a reflexive policyChecked


3 Create Firewall Access Rule

  • Go to Firewall > Access Rules page.
  • Select the type of view in the View Style section and go to From WAN To LAN.
  • Click Add and create the following rule:


From Zone: WAN
To Zone: LAN

DestinationMy webserver Public 
Users Allowed: All
Schedule: Always on
Enable Logging: checked

Allow Fragmented Packetschecked

Configure Cisco Switch for FreeNAS LACP link aggregation


Lets configure GigabitEthernet0/31 and GigabitEthernet0/31  switch (SW) for LACP link aggregation

SW#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
SW(config)#interface range GigabitEthernet0/31 - 32
SW(config-if-range)#no shut
SW(config-if-range)#channel-group 1 mode passive
Creating a port-channel interface Port-channel 1


For check the EtherChannel LACP configuration you can use either the show etherchannel summary or show etherchannel detail commands

SW#show etherchannel sum
SW#show etherchannel summary 
Flags:  D - down        P - bundled in port-channel
        I - stand-alone s - suspended
        H - Hot-standby (LACP only)
        R - Layer3      S - Layer2
        U - in use      f - failed to allocate aggregator

        M - not in use, minimum links not met
        u - unsuitable for bundling
        w - waiting to be aggregated
        d - default port

Number of channel-groups in use: 1
Number of aggregators:           1

Group  Port-channel  Protocol    Ports
1      Po1(SU)         LACP      Gi0/31(P)   Gi0/32(P)


Cisco switch initial configuration and setup IP


Here is initial configuration for Cisco switch, setup management IP and configure telnet


Enter to configuration mode:

switch#  conf t

Configure  IP address:

switch(config)#interface vlan 1 (enter to VLAN 1 configuring interface mode)
switch(config-if)#ip address (setup IP and netmask)
switch(config-if)#no shutdown (enable interface)

Setup password for enable mode:

switch# conf t
switch(config)# enable secret your_password
switch(config)# exit

Save configuration:

switch# write mem
Building configuration


Or you can edit text below copy and paste in terminal:

conf t
interface vlan 1
ip address
no shutdown
enable secret password_for_enable_mode
line VTY 0 4
password your_pasword
write mem