CAN KMS PICO HARM YOUR COMPUTER? A LOOK AT THE SECURITY IMPLICATIONS