Using Junk Spy with MR/2 ICE

Table of Contents
  1. Introduction
  2. Overview
  3. Changing Settings in MR/2 ICE
  4. Creating a MR/2 ICE Filter
  5. Take a Look at the User's Guide
  6. Restrictions with MR/2 ICE


Introduction

To effectively intercept your junk mail, Junk Spy works between your email program and your mail server. To make this possible, there are a few settings you will need to change in MR/2 ICE so that it retrieves your mail through Junk Spy. The purpose of this document is to walk you through those changes.


Overview

Normally, MR/2 ICE contacts your mail server and asks it for your mail. With Junk Spy, however, MR/2 ICE will contact Junk Spy and ask it for your mail. But Junk Spy needs to know where to get that mail, so you will change MR/2 ICE to pass that information along too.

There are just two basic steps to get everything running smoothly. For each MR/2 ICE email account you'll:

All of the changes you'll make to your MR/2 ICE settings relate to retrieving email. There won't be any other changes to your MR/2 ICE configuration.

Note also that you can use Junk Spy with as many of your MR/2 ICE accounts as you want. If you have multiple accounts in MR/2 ICE, just make the changes for each account that you want Junk Spy to monitor.


Changing Settings in MR/2 ICE

You might already have the MR/2 ICE Settings dialog open. If it's not, select the Options menu, then the Settings menu item, then click on the Network tab. Depending on which version of MR/2 ICE you are running, it will look something like this:

Start by adding the @ character to the User Name field. Then copy the POP Host Name information into the User Name field after the @ character.

Erase the POP Host Name field and replace it with the name of your computer. If you don't know the name of your computer, use the Junk Spy TCP/IP Wizard.

The dialog should now look like this:

Close the settings dialog to save your work.


Creating an MR/2 ICE Filter

Each piece of junk mail that Junk Spy detects is flagged with a special entry in the message header. By using your email program's filtering capability, you can control what happens to those junk messages. You might want to just delete them, for instance, or perhaps save them to a special folder.

Select the MR/2 ICE Utilities menu and the Filter Maintainence sub menu. Click on the New button to create a new filter.

The dialog should now look similar to this:


The front page of a new filter

Next you'll want to:

Click on the OK button to save your work.

Now when MR/2 ICE retrieves mail it will first pass through Junk Spy and its junk mail detection process.

You're now ready to start Junk Spy by double clicking on the main program object in the Junk Spy folder.


You'll see that Junk Spy takes up very little space on your desktop.


Take a Look at the User's Guide

Junk Spy's User's Guide is on-line, so it is just a mouse click away. It is a good reference that you should find useful. All of Junk Spy's features and options are covered in the User's Guide.

When you installed Junk Spy, it put a Junk Spy folder on your desktop. You'll find the User's Guide in it in the Documentation folder. You'll also find it's an option on Junk Spy's Help menu.


Restrictions with MR/2 ICE

Junk Spy Detector Setting Restriction

Junk Spy includes options to either flag and deliver the junk mail it finds or to destroy it. Some email programs require one or the other to interact properly with Junk Spy. MR/2 ICE is one such program, and it requires that junk messages be delivered rather than destroyed.

Thus, you do not want to change the Action selection in Junk Spy's Detector Settings. It should always be set to "Flag and deliver message."

However, this doesn't mean you can't have junk mail eliminated for you automatically. If you want the junk messages destroyed, you should select that option in your MR/2 ICE filter, as described above.

Possible Problem with the MR/2 ICE Userid Field

If you have a long username and server name, it may not fit in MR/2 ICE's userid field. MR/2 ICE only allows for 30 characters in the user name field, but there are two options for solving this problem.

First, Junk Spy has a feature for specifying a default mail server. This is normally used by programs such as Netscape which won't pass the server information. But it can be used with MR/2 ICE if you only have one email account or all of your accounts are on the same server.

Now when MR/2 ICE requests mail from Junk Spy, since the server is not provided, Junk Spy will use the default server.

Or, the second solution is to create an alias for your mail server.


Copyright 1999, 2000, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. OS/2 is a registered trademark of International Business Machines Corporation. All other trademarks remain the property of their respective owners.