Difference between revisions of "Help Yourself Archive"
(→Documentation) |
|||
Line 12: | Line 12: | ||
* [https://webmail-0.gac.edu/horde/imp/login.php Check your 鶹Ƶ Webmail] | * [https://webmail-0.gac.edu/horde/imp/login.php Check your 鶹Ƶ Webmail] | ||
− | + | ||
====Configure your email application==== | ====Configure your email application==== | ||
=====Introduction===== | =====Introduction===== |
Revision as of 14:27, 31 August 2006
Contents
Energy consumption
Tools
- - Spam filtering, away messages, forwarding...
Configure your email application
Introduction
IMAP and POP are two different protocols for managing e-mail. The Technology Services Department at 鶹Ƶ recommends IMAP for your mail, but supports both POP and IMAP. IMAP allows you the ability to easily access and manage your mail from different locations and platforms. IMAP stores your mail on the server and allows you to organize it in folders on the server. Using IMAP mail will also allow you to access all of your mail while you are away from campus.
The Technology Services Department recommends the use of either Thunderbird, Eudora, Mail (Macintosh Only) or the for IMAP mail.
General Settings
During the installation or configuration of your email application you may be asked for the following information:
Incoming Settings
- Mailserver: imap.gac.edu (use IMAP even if using POP)
- Using Port (default): 993 (IMAP) 995 (POP)
- Using: SSL and Authentication
Outgoing Settings
- SMTP Server: smtp-auth.gac.edu
- Using Port (alternative): 465
- Using: SSL and Authentication
Other Settings
- Type of Connection T1 or LAN
- E-mail Address yourusername@gustavus.edu
- Profile Location Recommend saving your profile in your My Documents folder
Eudora
Thunderbird
Windows Outlook Express IMAP
Home Directory
GoLive
Security
- Good Computing Habits for Windows Users
- How to backup your data (Windows)
- How to backup your data (Macintosh)
- Update your Symantec Antivirus using LiveUpdate
File Sharing
We recommend that you do not use "file sharing" (connecting via the network directly from one client computer to another client computer) to transfer files or make them available, as it will expose your computer to security risks and will not be reliable.