KNOWING THE THREATS OF APPLYING KMS PICO FOR SOFTWARE PROGRAM ACTIVATION