Three Key Steps to Secure PC Software