SHIELDING YOUR METHOD FROM KMS PICO AND VARIOUS ACTIVATION MALWARE