To effectively intercept your junk mail, Junk Spy works between your email
program and your mail server. To make this possible, there are a few
settings you will need to change in MR/2 ICE so that it retrieves your
mail through Junk Spy. The purpose of this document is to walk you through
those changes.
Normally, MR/2 ICE contacts your mail server and asks it for your mail.
With Junk Spy, however, MR/2 ICE will contact Junk Spy and ask it for your mail. But Junk Spy
needs to know where to get that mail, so you will change MR/2 ICE to pass
that information along too.
There are just two basic steps to get everything running smoothly. For each MR/2 ICE email account you'll:
All of the changes you'll make to your MR/2 ICE settings relate to retrieving email. There won't be any other changes to your MR/2 ICE configuration.
Note also that you can use Junk Spy with as many of your MR/2 ICE accounts as you want. If you have multiple accounts in MR/2 ICE, just make the changes for each account that you want Junk Spy to monitor.
Start by adding the @ character to the User Name field. Then copy the
POP Host Name information into the User Name field after the @ character.
Erase the POP Host Name field and replace it with the name
of your computer. If you don't know the name of your computer, use the
Junk Spy TCP/IP Wizard.
The dialog should now look like this:
Close the settings dialog to save your work.
Each piece of junk mail that Junk Spy detects is flagged with a special entry in the message header. By using your email program's filtering capability, you can control what happens to those junk messages. You might want to just delete them, for instance, or perhaps save them to a special folder.
Select the MR/2 ICE Utilities menu and the Filter Maintainence sub
menu. Click on the New button to create a new filter.
The dialog should now look similar to this:
Next you'll want to:
Click on the OK button to save your work.
Now when MR/2 ICE retrieves mail it will first pass through Junk Spy and its junk mail detection process.
You're now ready to start Junk Spy by double clicking on the main program object in the Junk Spy folder.
Junk Spy's User's Guide is on-line, so it is just a mouse click away. It is a good reference that you should find useful. All of Junk Spy's features and options are covered in the User's Guide.
When you installed Junk Spy, it put a Junk Spy folder on your desktop. You'll find the User's Guide in it in the Documentation folder. You'll also find it's an option on Junk Spy's Help menu.
Junk Spy includes options to either flag and deliver the junk mail it finds or to destroy it. Some email programs require one or the other to interact properly with Junk Spy. MR/2 ICE is one such program, and it requires that junk messages be delivered rather than destroyed.
Thus, you do not want to change the Action selection in Junk Spy's Detector Settings. It should always be set to "Flag and deliver message."
However, this doesn't mean you can't have junk mail eliminated for you automatically.
If you want the junk messages destroyed, you should select that option in your MR/2 ICE
filter, as described above.
If you have a long username and server name, it may not fit in MR/2 ICE's userid field. MR/2 ICE only allows for 30 characters in the user name field, but there are two options for solving this problem.
First, Junk Spy has a feature for specifying a default mail server. This is normally used by programs such as Netscape which won't pass the server information. But it can be used with MR/2 ICE if you only have one email account or all of your accounts are on the same server.
Now when MR/2 ICE requests mail from Junk Spy, since the server is not provided, Junk Spy will use the default server.
Or, the second solution is to create an alias for your mail server.
Overview
Changing Settings in MR/2 ICE
You might already have the MR/2 ICE Settings dialog
open. If it's not, select the Options menu, then the Settings
menu item, then click on the Network tab. Depending on which version of MR/2 ICE you are running, it will look something like this:
Creating an MR/2 ICE Filter
The front page of a new filter
You'll see that Junk Spy takes up very little space on your desktop.Take a Look at the User's Guide
Restrictions with MR/2 ICE
Junk Spy Detector Setting Restriction
Possible Problem with the MR/2 ICE Userid Field
Copyright 1999, 2000, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. OS/2 is a registered trademark of International Business Machines Corporation. All other trademarks remain the property of their respective owners.