Answer the question
In order to leave comments, you need to log in
Answer the question
In order to leave comments, you need to log in
Viperet is right. Perhaps now there are some standard protocols, but in 2001 I tried to make one device based on an old scanner. There he had his own undocumented protocol. I can advise you to do the following:
1. First, find documentation for the scanner which will be more accessible and real for that scanner and rush to write. You can easily find an old scanner on ebee
2. Catch LPT traffic and try to analyze commands. But this is not the easiest way.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question