Attack
Operation Manual
6
Waldorf
or
An AudioUnit 2.0 compatible host application that supports AudioUnit Instruments,
such as Apple Logic or GarageBand. This must be correctly installed on your com-
puter.
���
Please also observe the system requirements of your host application!
Installation under Mac OS
Proceed as follows to install the Attack:
1. Quit all other applications so that you return to the Finder. Disable any system acti-
vity monitoring software or extension, in particular anti-virus software. Then insert the
Attack CD into your computer’s CD-ROM drive.
2. If you need to, double click on the Attack icon to open the CD window.
3. Double click on the Attack Installer icon to load the installation software. Follow the
instructions on the screen.
The Attack CD-ROM is your verification that you have purchased the program. Please
store it in a safe place. If you lose it, you have lost the Program.
���
Please note the “Read Me” and “Important Changes” text files on the Attack CD-
ROM, which contain additional information and/or any changes.
Using the Attack as VST or AudioUnit Instrument
For users of VST or AudioUnit (Macintosh only) compatible host applications, Waldorf
offers the Attack as a completely plug-in-based synthesizer that fully utilizes Steinberg's
VST and Apple's AudioUnit interface technology. If you wish to use it in a VST or Au-
dioUnit compatible host application, please consult its documentation to find out what
you have to do to set up the plug-in.
Using the Attack
You can play the Attack via MIDI like any other instrument, and record what you play
on a MIDI track. To make sure, press a key on your MIDI keyboard. You should now
hear a sound. If you don’t hear anything, determine first whether your host application
receives MIDI data at all. If you notice considerable latency times (delay) when you
play the Attack via MIDI, please read the chapter "Playing the Attack Live". For more
information about MIDI functionality, refer to page 7 of this manual.
If you don’t want to play the Attack exclusively from the integrated screen keyboard,
make sure that your host application receives MIDI data that you generate from your
external MIDI Master keyboard.
To activate the Attack as a virtual instrument please consult the corresponding do-
cumentation of your host application.
Audio Channels of the Attack
The audio signals that are created by a virtual instrument are automatically routed to
the Channel Mixer of your host application. Open this mixer. For each open Attack
Содержание Attack
Страница 1: ......