RDP Vulnerabilities and How to Eliminate Them