KNOWING THE THREATS OF UTILIZING KMS PICO FOR APPLICATION ACTIVATION