Junk Spy (tm) for OS/2 from Sundial Systems Release Notes (README.TXT) for Junk Spy Version 2.0 April 2001 Thank you for trying Junk Spy Version 2.0 for OS/2. This file contains information which supplements the on-line documentation as well as other key information to help you get started. Compatibility OS/2, Presentation Manager, and Workplace Shell Compatibility: Junk Spy is designed specifically for use with OS/2 Version 3 or 4 and the Workplace Shell. This includes all of the following releases: OS/2 Warp Server for e-Business "General Availability" release OS/2 Warp 4 "General Availability" release OS/2 Warp Server "General Availability" release OS/2 Warp Connect "Red Box" (for use with Windows) release "Blue Box" (with Win-OS2) release Most "FixPak" levels of the above have also been tested. Note: Warp 3 is ONLY supported when the networking portion of Warp Connect has been installed. Email Program Compatibility: Junk Spy works with most POP3 email programs. Sundial Systems has specifically tested Junk Spy with the following OS/2 email clients: MR/2 ICE 1.6x - 2.0 Netscape 2.02 Service Level 8, 4.04, 4.61 PMMail 1.95, 1.96, 2.x Polarbar Mailer Post Road Mailer 3.0 Installation Instructions First, if you downloaded Junk Spy or received it electronically, unzip the files into a temporary directory. Next, change to the directory where you unzipped the files, or to the diskette on which you received Junk Spy. From there, run INSTALL.EXE. Or if you prefer, open the folder or drive object that contains the unzipped Junk Spy files and double click on the INSTALL.EXE icon. When INSTALL.EXE starts, it will ask you where to install Junk Spy. (Note to Junk Spy Prerelease Users: Version 2.0 may be installed over any previous version.) Once you've specified a directory, the installation program will begin to copy the files. When the installation is complete, you'll have a folder for Junk Spy on your OS/2 desktop. Open the folder and start Junk Spy by double clicking on the program object. Alternatively, if you open an OS/2 command window, you can change to the Junk Spy directory and run the JUNKSPY.EXE executable from the command line. Your next step should be to follow the Getting Started Guide for your specific email program. It's located in the Junk Spy documentation folder and will take you step by step through the process of configuring your email program to communicate with Junk Spy. Following these directions will insure that Junk Spy can properly interact with both your email program and your mail server. Getting Junk Detection Updates One of Junk Spy's important features is the ability to automatically receive and process updates via email. This service is available only to licensed users of Junk Spy, and is initially based on contact information provided when the product was purchased. After purchase, you'll receive a password to use with your license number for access to the Junk Spy Detection Update Center at: http://www.JunkSpy.com/updatecenter.html We strongly suggest that you change the password right away to something that is meaningful to you. The Junk Spy Detection Update Center is the place to go if you need to change the email address that your Junk Spy updates are sent to. In addition, you'll see when updates have been sent and can have them resent to you, if necessary. Limitations Listed below are some known limitations which may impact your use of the current version of Junk Spy. * TCP/IP version 4.1 has several known problems. Before using Junk Spy please upgrade to TCP/IP 4.2 by installing MPTS FixPak 8620. You can download this update from ftp://ps.software.ibm.com/ps/products/mpts/fixes/english-us/wr08620/ NOTE: This update only applies to TCP/IP 4.1 and is not compatible with the TCPIP 4.0 included with Warp 4. Junk Spy will function correctly with these earlier versions. * Use of Junk Spy's option to delete (rather than flag) incoming junk email should not be used with PMMail, Post Road Mailer or MR2/ICE (due to limitations in way they communicate with mail servers). * A very few users have reported difficulty using Junk Spy in a DHCP environment. Junk Spy is compatible with DHCP clients, but may have difficulty with certain DHCP parameters. If you are experiencing problems with Junk Spy on a DHCP system please contact technical support. The Legal Fine Print Copyright (c) 2001 Sundial Systems Coporation. All Rights Reserved. Junk Spy is a trademark of Sundial Systems Corporation. All other trademarks remain the property of their respective owners. Technical Support We at Sundial Systems are committed to supporting you, our customer. We track all questions, comments, and "bug reports" concerning our products and use this information in planning future releases. If there are features you particularly like or things you think should be added to our products, please let us know. Please consult your license agreement and the on-line documentation for details about the level of technical support to which you are entitled. On the Internet you can send email to support@JunkSpy.com, or visit us on the web at www.JunkSpy.com. Thanks in advance, Junk Spy Support Sundial Systems Corporation