THE FUNCTION OF KMS PICO IN THE FIGHT TOWARDS SOFTWARE COUNTERFEITING