DEFENDING YOUR METHOD FROM KMS PICO AND OTHER ACTIVATION MALWARE