KMS PICO AND ITS IMPLICATIONS FOR COMPUTER SOFTWARE PROTECTION