To effectively intercept your junk mail, Junk Spy works between your email
program and your mail server. To make this possible, there are a few
settings you will need to change in your email program so that it retrieves your
mail through Junk Spy. The purpose of this document is to walk you through
those changes.
Normally, your mail reader contacts your mail server and asks it for your mail.
With Junk Spy, however, it will contact Junk Spy and ask it for your mail. But Junk Spy
needs to know where to get that mail, so you will change your mail program to pass
that information along too.
There are just two basic steps to get everything running smoothly. You'll:
All of the changes you'll make to your email settings relate to retrieving email.
Note also that if your email program allows you to have several email accounts, you can use Junk Spy with as many of them as you want. If you have multiple accounts in your email program, just make the changes for each account that you want Junk Spy to monitor.
There are two elements of information that need to be changed so that
your email program will retrieve its mail through Junk Spy. Open the
settings for your program that relate to retrieving mail.
Start by adding the @ character to the User ID field. Then copy the
POP Server information into the User ID field after the @ character. The content of the field should now look something like:
Next, erase the name of your POP server and replace it with the name
of your computer. If you don't know the name of your computer, use the
Junk Spy TCP/IP Wizard to determine it.
Most mail programs expect to receive
each message that was available when it connects to your mail server.
Therefore, rather than simply removing your junk mail, Junk Spy can send a
replacement message for each junk message that is detected. Junk Spy's
replacement messages are easily identifiable, and you will want to
create a filter to delete them.
When you create a filter, you should set it to look for the text
"X-Junkmail: Yes" in the header of the message. If this text is found,
the message should be deleted or moved into the appropriate folder.
Consult the documentation of your email program for the specific details
of this process.
Now that you have made changes to your email program, there is just one more thing to do.
You're ready to start Junk Spy by double clicking on the main program object in the Junk Spy folder.
Junk Spy's User's Guide is on-line, so it is just a mouse click away. It is a good reference that you should find useful. All of Junk Spy's features and options are covered in the User's Guide.
Overview
Changing Settings in Your Email Program
Creating a Filter
You'll see that Junk Spy takes up very little space on your desktop.Take a Look at the User's Guide
Copyright 1999, 2000, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. OS/2 is a registered trademark of International Business Machines Corporation. All other trademarks remain the property of their respective owners.