PROTECTING YOUR PROCEDURE FROM KMS PICO AND OTHER ACTIVATION MALWARE