Wang Image Edit Control (IMGEDIT.OCX)

Posted on 1998-10-15
Last Modified: 2013-12-25
I would like to use the 'Wang Image Edit Control' (IMGEDIT.OCX) in my application to add some text to a TIFF image. Where can I get the documentation of this OCX from? The OCX comes with NT4.0 as part of the Wang Image Viewer (now it's no longer Wang, but Eastman Software).
Question by:RalfZ

Author Comment

ID: 1487685
There is no information on the Eastman homepage.

Expert Comment

ID: 1487686
you can find information about wang image product at

I advice you to use lead32 control its more powrfull

Author Comment

ID: 1487687
There is no technical information about the Wang Image Edit Control OCX on the Wang Website
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

LVL 12

Accepted Solution

fulscher earned 80 total points
ID: 1487688
Wang has been bought by Eastman Software. Try

this has pointers. However, I don't know whether the "light" version that comes with NT/95 provides all necessary interfaces.


Expert Comment

ID: 1487689
i have ImgEdit.hlp and i developed some application using it if u wish i can send it 2 u

Author Comment

ID: 1487690
Thank U for your help, but I already found the ImgEdit.hlp and all the calls I need to know.

Author Comment

ID: 1487691
Does anybody know how to create an object of the Edit Control OCX? I tried
-Set oImgEdit = CreateObject("ImgAdminLib.ImgEdit")
-Set oImgEdit = CreateObject("WangImage.EditCtrl.1")
and different other things (e.g. WITH activated reference to IMGEDIT.OCX, but how to refer to it (blanks in its name do prevent it :-(( ), all of them without success.
The reason why I need this is that I want to develop an OLE-Server which uses some methods of the Wang Edit Control OCX.

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

There are many ways to remove duplicate entries in an SQL or Access database. Most make you temporarily insert an ID field, make a temp table and copy data back and forth, and/or are slow. Here is an easy way in VB6 using ADO to remove duplicate row…
Introduction While answering a recent question ( in the VB classic zone, I wrote some VB code in the (Office) VBA environment, rather than fire up my older PC.  I didn't post completely correct code o…
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
This lesson covers basic error handling code in Microsoft Excel using VBA. This is the first lesson in a 3-part series that uses code to loop through an Excel spreadsheet in VBA and then fix errors, taking advantage of error handling code. This l…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now