This guide for Junk Spy was current when issued. But as programs are
updated, sometimes changes are necessary in the supporting
documentation. The most current version of this guide is always
available to you on the Junk Spy website where you can view and/or
download it.
To effectively intercept your junk mail, Junk Spy works between your email
program and your mail server. To make this possible, there are a few
settings you will need to change in Notes so that it retrieves your
mail through Junk Spy. The purpose of this document is to walk you through
those changes.
Note that POP3 is the only supported protocol for Junk Spy and Notes.
Future versions may support Domino servers as well as IMAP.
Normally, Notes contacts your POP mail server and asks it for your mail.
With Junk Spy, however, Notes will contact Junk Spy and ask it for your mail. But Junk Spy
needs to know where to get that mail, so you will change Notes to pass
that information along too.
There are just two basic steps to get everything running smoothly. For each Notes email account you'll:
All of the changes you'll make to your Notes settings relate to retrieving email. There won't be any other changes to your Notes configuration.
Note also that you can use Junk Spy with as many of your Notes accounts as you want. If you have multiple accounts in Notes, just make the changes for each account that you want Junk Spy to monitor.
To begin, open the Account Settings for the Notes account you intend to
use with Junk Spy. First File menu, Mobile, then Locations. In the
pane on the right, select Accounts. Select the Account you wish to
modify and press the Edit Account button.
Start by adding the @ character to the User ID field. Then copy the
POP Server information into the User ID field after the @ character.
Next, erase the name of your POP server and replace it with the name
of your computer. If you don't know the name of your computer, use the
Junk Spy TCP/IP Wizard.
The dialog should now look like this:
Now that you have changed Notes so that it will retrieve mail from
Junk Spy, there is one other step.
Each piece of junk mail that Junk Spy detects is flagged with a special entry in the message header. By using your email program's filtering capability, you can control what happens to those junk messages. You might want to just delete them, for instance, or perhaps save them to a special folder.
Because of the complexity of Lotus Notes, creating an Agent is beyond
the scope of this guide.
When you create your agent, you should use it to look for the text
"X-JunkMail: Yes" in the header of the message.
You're now ready to start Junk Spy by double clicking on the main program object in the Junk Spy folder.
Junk Spy's User's Guide is on-line, so it is just a mouse click away. It is a good reference that you should find useful. All of Junk Spy's features and options are covered in the User's Guide.
When you installed Junk Spy, it put a Junk Spy folder on your desktop. You'll find the User's Guide in it in the Documentation folder. You'll also find it's an option on Junk Spy's Help menu.
Junk Spy includes options to either flag and deliver the junk mail it finds or to destroy it. Some email programs require one or the other to interact properly with Junk Spy. Notes is one such program, and it requires that junk messages be delivered rather than destroyed.
Thus, you do not want to change the Action selection in Junk Spy's Detector Settings. It should always be set to "Flag and deliver message."
However, this doesn't mean you can't have junk mail eliminated for you automatically.
If you want the junk messages destroyed, you should select that option in your Notes
agent, as described above.
Introduction
Overview
Changing Settings in Notes
Creating a Notes Agent
You'll see that Junk Spy takes up very little space on your desktop.Take a Look at the User's Guide
A Restriction with Notes
Copyright 1999, 2000, Sundial Systems Corporation. ALL RIGHTS RESERVED.
Junk Spy is a trademark of Sundial Systems Corporation. OS/2 is a registered trademark of International Business Machines Corporation. All other trademarks remain the property of their respective owners.