Operation Manual

1.2 Installation 9
Keep in mind that the computational power required by Strum Acoustic Session depends on the
number of voices of polyphony and the sampling rate used. These computer configurations will
enable you to play the factory presets with a reasonable number of voices.
1.2 Installation
Mac OS
Insert the Strum Acoustic Session program disc into your CD-ROM drive. Open the CD icon
once it appears on your desktop. Click on the Strum Acoustic Session Install icon and follow the
instructions of the installer.
If you purchased this software online, simply double-click on the installer file that you have
downloaded and follow the instructions of the installer.
Windows
Insert the Strum Acoustic Session program disc into your CD-ROM drive. Launch Explorer to
view the content of the CD-ROM and double-click on the installer file to launch the installer.
If you purchased this software online, simply double-click on the installer file that you have
downloaded and follow the instructions of the installer.
1.3 Authorization and Registration
Strum Acoustic Session uses a proprietary challenge/response copy protection system which re-
quires authorization of the product. A challenge key is a long string of capital letters and numbers
that is generated uniquely for each machine during the registration process. In other words, for
each machine you install this program on, a different challenge key will be generated by the pro-
gram. The response key is another unique string of capital letters and numbers generated from the
data encrypted in the challenge key. In order to obtain a response key, you will need to connect to
the A|A|S website and provide the following information:
A valid email address
Your product serial number (on the back of the sleeve of your CD or in your confirmation
email for downloads)
The challenge key generated by the program
Note that it is possible to use the program during 15 days before completing the authorization
process. This period can be convenient if you are installing the program on a computer which is
not connected to the internet. After that period, the program will not function unless it is supplied
with a response key.
In the following sections we review the different steps required to generate the challenge keys
and obtain the response key. The procedure is similar on Windows XP and Mac OS systems.