PROTECTING YOUR PROCESS FROM KMS PICO AND OTHER ACTIVATION MALWARE