THE THREATS AND OPPORTUNITY DANGERS OF USING KMS PICO FOR SOFTWARE PROGRAM ACTIVATION