HOW TO ELIMINATE KMS PICO FROM THE COMPUTER SYSTEM SAFELY AND SECURELY