IS KMS PICO HARMLESS? COMPREHENDING THE SECURITY IMPLICATIONS OF WORKING WITH APPLICATION ACTIVATION TOOLS