Similarly, the alternate method for proving infringement by showing intent to use software without authorization by having knowledge that the software being accessed, absent a license or prior authorization, allows for software that is not traditionally associated with business to be covered by the same protections given to software used in the conducting of business