THE THREATS AND PROBABLE DANGERS OF APPLYING KMS PICO FOR APPLICATION ACTIVATION