Help Yourself Archive
Contents
Energy consumption
Tools
- - Spam filtering, away messages, forwarding...
Documentation
Configure your email application
Introduction
IMAP and POP are two different protocols for managing e-mail. The Technology Services Department at 鶹Ƶ recommends IMAP for your mail, but supports both POP and IMAP. IMAP allows you the ability to easily access and manage your mail from different locations and platforms. IMAP stores your mail on the server and allows you to organize it in folders on the server. Using IMAP mail will also allow you to access all of your mail while you are away from campus.
The Technology Services Department recommends the use of either Thunderbird, Eudora, Mail (Macintosh Only) or the for IMAP mail.
General Settings
During the installation or configuration of your email application you may be asked for the following information:
Incoming Settings
- Mailserver: imap.gac.edu (use IMAP even if using POP)
- Using Port (default): 993 (IMAP) 995 (POP)
- Using: SSL and Authentication
Outgoing Settings
- SMTP Server: smtp-auth.gac.edu
- Using Port (alternative): 465
- Using: SSL and Authentication
Other Settings
- Type of Connection T1 or LAN
- E-mail Address yourusername@gustavus.edu
- Profile Location Recommend saving your profile in your My Documents folder
Eudora
Thunderbird
Windows Outlook Express IMAP
- From the Tools menu select Accounts
- Select your 鶹Ƶ account and click the Properties button.
Windows Eudora POP
Please upgrade to verson 6.2.5 of Eudora, available from the . Eudora 7 is the most current version, and not recommended at this time. After downloading please install. After installation verify your settings.
Macintosh OS X Eudora (IMAP)
From the Special menu select Settings
Macintosh OS X Mail (IMAP)
Macintosh Thunderbird (IMAP)
Macintosh Classic Eudora
Home Directory
GoLive
Security
- Good Computing Habits for Windows Users
- How to backup your data (Windows)
- How to backup your data (Macintosh)
- Update your Symantec Antivirus using LiveUpdate
File Sharing
We recommend that you do not use "file sharing" (connecting via the network directly from one client computer to another client computer) to transfer files or make them available, as it will expose your computer to security risks and will not be reliable.