Using Junk Spy with Other Email Programs

Table of Contents
  1. Introduction
  2. Overview
  3. Changing Settings in your email program
  4. Creating a Filter
  5. Take a Look at the User's Guide


Introduction

To effectively intercept your junk mail, Junk Spy works between your email program and your mail server. To make this possible, there are a few settings you will need to change in your email program so that it retrieves your mail through Junk Spy. The purpose of this document is to walk you through those changes.


Overview

Normally, your mail reader contacts your mail server and asks it for your mail. With Junk Spy, however, it will contact Junk Spy and ask it for your mail. But Junk Spy needs to know where to get that mail, so you will change your mail program to pass that information along too.

There are just two basic steps to get everything running smoothly. You'll:

All of the changes you'll make to your email settings relate to retrieving email.

Note also that if your email program allows you to have several email accounts, you can use Junk Spy with as many of them as you want. If you have multiple accounts in your email program, just make the changes for each account that you want Junk Spy to monitor.


Changing Settings in Your Email Program

There are two elements of information that need to be changed so that your email program will retrieve its mail through Junk Spy. Open the settings for your program that relate to retrieving mail.

Start by adding the @ character to the User ID field. Then copy the POP Server information into the User ID field after the @ character. The content of the field should now look something like:

john@localhost

Next, erase the name of your POP server and replace it with the name of your computer. If you don't know the name of your computer, use the Junk Spy TCP/IP Wizard to determine it.


Creating a Filter

Most mail programs expect to receive each message that was available when it connects to your mail server. Therefore, rather than simply removing your junk mail, Junk Spy can send a replacement message for each junk message that is detected. Junk Spy's replacement messages are easily identifiable, and you will want to create a filter to delete them.

When you create a filter, you should set it to look for the text "X-Junkmail: Yes" in the header of the message. If this text is found, the message should be deleted or moved into the appropriate folder. Consult the documentation of your email program for the specific details of this process.

Now that you have made changes to your email program, there is just one more thing to do. You're ready to start Junk Spy by double clicking on the main program object in the Junk Spy folder.


You'll see that Junk Spy takes up very little space on your desktop.


Take a Look at the User's Guide

Junk Spy's User's Guide is on-line, so it is just a mouse click away. It is a good reference that you should find useful. All of Junk Spy's features and options are covered in the User's Guide.


Copyright 1999, 2000, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. OS/2 is a registered trademark of International Business Machines Corporation. All other trademarks remain the property of their respective owners.