Using Junk Spy with Post Road Mailer

Table of Contents
  1. Introduction
  2. Overview
  3. Changing Settings in Post Road Mailer
  4. Creating a Post Road Mailer Filter
  5. Take a Look at the User's Guide
  6. A Restriction with Post Road Mailer


Introduction

To effectively intercept your junk mail, Junk Spy works between your email program and your mail server. To make this possible, there are a few settings you will need to change in Post Road Mailer so that it retrieves your mail through Junk Spy. The purpose of this document is to walk you through those changes.


Overview

Normally, Post Road Mailer contacts your mail server and asks it for your mail. With Junk Spy, however, Post Road Mailer will contact Junk Spy and ask it for your mail. But Junk Spy needs to know where to get that mail, so you will change Post Road Mailer to pass that information along too.

There are just two basic steps to get everything running smoothly. For each Post Road Mailer inbasket you'll:

All of the changes you'll make to your Post Road Mailer settings relate to retrieving email. There won't be any other changes to your Post Road Mailer configuration.

Note also that you can use Junk Spy with as many of your Post Road Mailer inbaskets as you want. If you have multiple inbaskets in Post Road Mailer, just make the changes for each inbasket that you want Junk Spy to monitor.


Changing Settings in Post Road Mailer

To begin, open the Account Settings for the Post Road Mailer account you intend to use with Junk Spy. First select the File menu, then Settings menu item. Click on the POP3 tab. Depending on which version of Post Road Mailer you are running, it will look something like this:

Erase the name of your POP server and replace it with the name of your computer. If you don't know the name of your computer, use the Junk Spy TCP/IP Wizard.

The dialog should now look like this:

Now that you have changed Post Road Mailer so that it will retrieve mail from Junk Spy, there is one remaining step. Close the Post Road Mailer settings dialog.


Creating a Post Road Mailer Filter

Each piece of junk mail that Junk Spy detects is flagged with a special entry in the message header. By using your email program's filtering capability, you can control what happens to those junk messages. You might want to just delete them, for instance, or perhaps save them to a special folder.

Select the Post Road Mailer Features menu, then Filters. Double click on the "Add a new message filter" icon.

The dialog should now look similar to this:

Click on the OK button to save your work, then close the Filter dialog.

Now when Post Road Mailer retrieves mail, it will first pass through Junk Spy and its junk mail detection process.

You're now ready to start Junk Spy by double clicking on the main program object in the Junk Spy folder.


You'll see that Junk Spy takes up very little space on your desktop.


Take a Look at the User's Guide

Junk Spy's User's Guide is on-line, so it is just a mouse click away. It is a good reference that you should find useful. All of Junk Spy's features and options are covered in the User's Guide.

When you installed Junk Spy, it put a Junk Spy folder on your desktop. You'll find the User's Guide in it in the Documentation folder. You'll also find it's an option on Junk Spy's Help menu.


A Restriction with Post Road Mailer

Junk Spy includes options to either flag and deliver the junk mail it finds or to destroy it. Some email programs require one or the other to interact properly with Junk Spy. Post Road Mailer is one such program, and it requires that junk messages be delivered rather than destroyed.

Thus, you do not want to change the Action selection in Junk Spy's Detector Settings. It should always be set to "Flag and deliver message."

However, this doesn't mean you can't have junk mail eliminated for you automatically. If you want the junk messages destroyed, you should select that option in your Post Road Mailer filter, as described above.


Copyright 1999, 2000, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. OS/2 is a registered trademark of International Business Machines Corporation. All other trademarks remain the property of their respective owners.