This guide for Junk Spy was current when issued. But as programs are
updated, sometimes changes are necessary in the supporting
documentation. The most current version of this guide is always
available to you on the Junk Spy website where you can
view
and/or
download
it.
To effectively intercept your junk mail, Junk Spy works between your email
program and your mail server. To make this possible, there are a few
settings you will need to change in MR/2 ICE so that it retrieves your
mail through Junk Spy. The purpose of this document is to walk you through
those changes.
Normally when you get your mail, MR/2 ICE contacts your mail server and asks it for the incoming mail.
However, when you are using Junk Spy, getting your mail needs to be done differently.
Junk Spy will get the mail from your mail server and then MR/2 ICE will get it from Junk Spy.
To do this, Junk Spy needs to know where to get the mail, so you will change MR/2 ICE to pass that information along too.
There are just two basic steps to get everything running smoothly. For each MR/2 ICE email account you'll:
All of the changes you'll make to your MR/2 ICE settings relate to retrieving email. There won't be any other changes to your MR/2 ICE configuration.
Note also that you can use Junk Spy with as many of your MR/2 ICE accounts as you want. If you have multiple accounts in MR/2 ICE, just make the changes for each account that you want Junk Spy to monitor.
You might already have the MR/2 ICE Settings dialog open. If it's not,
First, look at the "Read Mail via" options.
If "POP3" is not selected, you may not be able to use Junk Spy with this
account. Contact support for more information.
Second, look at the POP3 Settings Host Name field.
If this contains:
Otherwise, now you are ready to make changes.
In the POP3 Settings section,
The full dialog should now look like this:
MR/2 ICE and Junk Spy are now working together.
NOTE: If you ever need to get your mail without having it processed
by Junk Spy, just change the settings above back to what they were before you started.
There is no need to undo the other changes you'll be making below or to
"uninstall" Junk Spy.
You're now ready to start Junk Spy.
Double-click on the program object in the Junk Spy folder to start it.
The little z's on the right in the Junk Spy window shown above tell you that Junk Spy is snoozing, and that's how it is much of the time.
It will spring into action just as soon as your email program starts to retrieve your mail. As it is working, the image will change to reflect what's being done - connecting, looking for mail, analyzing a message, checking with external junk mail resources, marking a message as junk, and so on.
Your email program now gets your mail through Junk Spy, so they are both working at the same time.
How will you know what's junk?
That's easy - junk mail will be marked as "JunkEmail" in the subject of the message.
Rather than having it mixed in with your other mail, you can have MR/2 ICE put it all into its own folder if you would like.
In that case, you'll want to create a filter in MR/2 ICE as explained below.
Each piece of junk mail that Junk Spy detects is flagged with a special entry in the message header. By using your email program's filtering capability, you can control what happens to those junk messages. You might want to just delete them, for instance, or perhaps save them to a special folder.
Select the MR/2 ICE Utilities menu and the Filter Maintainence sub
menu. Click on the New button to create a new filter.
The dialog should now look similar to this:
Next you'll want to:
Click on the OK button to save your work.
(Caution: Do not Cancel to close this window. If you do, the filter you created will
not be saved.)
Now when MR/2 ICE retrieves mail it will first pass through Junk Spy and its junk mail detection process.
And, all the mail identified as junk will not be in your inbox.
Junk Spy includes options to either flag and deliver the junk mail it finds or to destroy it. Some email programs require one or the other to interact properly with Junk Spy. MR/2 ICE is one such program, and it requires that junk messages be delivered rather than destroyed.
Thus, you do not want to change the Action selection in Junk Spy's Detector Settings. It should always be set to "Flag and deliver message."
However, this doesn't mean you can't have junk mail eliminated for you automatically.
If you want the junk messages destroyed, you should select that option in your MR/2 ICE
filter, as described above.
While you don't want to change the setting, you might want to see where it is.
To do so,
If you have a long username and server name, it may not fit in MR/2 ICE's userid field. Some versions of MR/2 ICE only allow for 30 characters in the user name field, but there are options for solving this problem.
Junk Spy has a feature for specifying a default mail server. This is normally used by programs such as Netscape which won't pass the server information. But it can be used with MR/2 ICE if you only have one email account or all of your accounts are on the same server.
Now when MR/2 ICE requests mail from Junk Spy, since the server is not provided, Junk Spy will use the default server.
If you have email accounts that use more than one mail server, you will need to create an alias for your mail server. Details for this procedure are provided in a special
FAQ on the Junk Spy web site.
It's time to start looking at Junk Spy's User's Guide.
You'll find out more about Junk Spy's settings and other usage information.
Right click on
the white area in the Junk Spy window
and you'll see the menu for Junk Spy.
Information about all those menu options and Junk Spy features are explained in the User's Guide. You'll find the User's Guide is an option on Junk Spy's Help menu.
You'll also find the User's Guide in the Documentation folder that's inside the Junk Spy folder put on your desktop when it was installed.
Because the guide is on-line, it is always just a few mouse clicks away. It's a good reference that you should find useful.
Introduction
Overview
Changing Settings in MR/2 ICE
CAUTIONS:
do not immediately proceed with the changes below.
Entries like these usually mean that an antivirus program is checking your mail in a way that will require special settings beyond those described here. See the
Antivirus Coexistance Information
page on the Junk Spy website and contact support if you need more information.
What to Expect
You'll see that Junk Spy takes up very little space on your desktop.Creating an MR/2 ICE Filter
X-Junkmail: Yes
The front page of a new filter
Restrictions with MR/2 ICE
Junk Spy Detector Setting Restriction
Possible Problem with the MR/2 ICE Userid Field
Take a Look at the User's Guide
Copyright 1999 - 2003, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. All other trademarks remain the property of their respective owners.