AttackOperation Manual 6 Waldorfor An AudioUnit 2.0 compatible host application that supports AudioUnit Instruments,such as Apple Logic or GarageBand. This must be correctly installed on your com-puter. Please also observe the system requirements of your host application!Installation under Mac OSProceed as follows to install the Attack:1. Quit all other applications so that you return to the Finder. Disable any system acti-vity monitoring software or extension, in particular anti-virus software. Then insert theAttack CD into your computer’s CD-ROM drive.2. If you need to, double click on the Attack icon to open the CD window.3. Double click on the Attack Installer icon to load the installation software. Follow theinstructions on the screen.The Attack CD-ROM is your verification that you have purchased the program. Pleasestore it in a safe place. If you lose it, you have lost the Program. Please note the “Read Me” and “Important Changes” text files on the Attack CD-ROM, which contain additional information and/or any changes.Using the Attack as VST or AudioUnit InstrumentFor users of VST or AudioUnit (Macintosh only) compatible host applications, Waldorfoffers the Attack as a completely plug-in-based synthesizer that fully utilizes Steinberg'sVST and Apple's AudioUnit interface technology. If you wish to use it in a VST or Au-dioUnit compatible host application, please consult its documentation to find out whatyou have to do to set up the plug-in.Using the AttackYou can play the Attack via MIDI like any other instrument, and record what you playon a MIDI track. To make sure, press a key on your MIDI keyboard. You should nowhear a sound. If you don’t hear anything, determine first whether your host applicationreceives MIDI data at all. If you notice considerable latency times (delay) when youplay the Attack via MIDI, please read the chapter "Playing the Attack Live". For moreinformation about MIDI functionality, refer to page 7 of this manual. If you don’t want to play the Attack exclusively from the integrated screen keyboard,make sure that your host application receives MIDI data that you generate from yourexternal MIDI Master keyboard. To activate the Attack as a virtual instrument please consult the corresponding do-cumentation of your host application.Audio Channels of the AttackThe audio signals that are created by a virtual instrument are automatically routed tothe Channel Mixer of your host application. Open this mixer. For each open Attack