KNOWING THE THREATS OF EMPLOYING KMS PICO FOR SOFTWARE PROGRAM ACTIVATION