SUCCESSFUL TECHNIQUES TO ELIMINATE KMS PICO FROM A COMPUTER SYSTEM