CryptoGateway 综合文本
文境: [Commercial][Archymeta Information Technologies]
[Product Documentation][POP3 Email Manager]
1) Main Manual
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d41d8cd98f00b204...)

1.1) Overview
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d41d8cd98f00b204...)

1.1.1) What it is used for
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (928e5b700f5f2975...)

It is a virtual e-mail system that aggregates e-mail messages from a set of user's online mailboxes. Using the system, a user with large number of e-mail messages can perform detailed multi-level sort, accurate search and dynamic and multi-view re-categorization of his/her e-mail messages.

1.1.2) Runtime Environment
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (a5732a82b3f6544c...)

Microsoft. NET 4.0 framework (If Microsoft. NET 2.0 and/or Microsoft. NET 3.5 frameworks are absent, it is sugguested to install them first from lower version number to higher ones to avoid future problems) .

1.1.3) Operating System
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (59fd21625c5a9b72...)

Microsoft Windows XP SP3 or newer ones (both 32-bit and 64-bit).

1.2) Setup
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d41d8cd98f00b204...)

1.2.1) Master Key
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (deabf87eadb7f134...)

Fig. Setup the master: Setup the master key for a email account group.

Set the master key. There is one master key for each email account group. It is used to unlock the password safe for the acconts inside the group so that a user do not have to memorize or input the passwords each time he/she want to open his/her emailboxes. Each time when an email account group is created, a master key setting dialog box is shown asking the user to set the master key (see Fig: Setup the master). Since it is the only passphrase one needs to remember, make it sufficiently difficult for others to guess.

1.2.2) First
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (fd19449bb395b8d2...)

First download the installation package and install.When the installation program prompts the user to install the above mentioned runtime environment, let the program to install them automattically, unless you have enough knowledge to know what you are doing.

1.2.3) Second
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (89c2aa484dedb35a...)

Fig. 1: The browse system directory button.

Second specify a root mail storage path. Push the "browse system directory" button to select a path for the root storage. One can choose to point it to neither a pre-existing directory or a newly created one (see Fig: 1). This directory is the root storage directory for messages of all mailboxes in a given mailbox group.

1.2.4) Third
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (1818d5c25f13964c...)

Fig. 2: Create and load the master key.

Then create a master key. Push the "key" button (see Fig: 2) located at the upper right corner of the window to create a master key. A new dialog box pops up in which a user can enter a passphrase. Since it is the only passphrase one needs to remember, make it sufficiently difficult for others to guess. The master key is used to open the lock that secures all of passwords belonging to a given mailbox group so that a user does not need to enter the password for each mail account every time he/she needs to login. It also creates a manageable mean for the user to set strong, distinct and frequently changing password for each of his/her mail account. The user's online identity and information security improves in doing so. Of course the user has the responsibility to properly safe keeping his/her master key and mailbox group configuration files. Because of the fact that it is not necessary for them to be passed around over the internet, the said mean overcomes one of the bigger security weaknesses the presented today. But the same mean does not make it more secure than any other means on any other aspect of it usage. For the other aspects, a user should use his/her own caution and security measures (e.g. preventing key loggers from recording the master key passphrase, preventing the mailbox group configuration files from been stolen or lost, etc.).

The master key will unload together with all of the passwords for the mail accounts after it loading to improve security. That is why the system will ask the user to re-authenticate himself/herself after awhile when the user perform operations.

1.2.5) Fourth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (a4eb971e99dc1bde...)

Fig. 3: A new tab page of a mailbox.

Setting up the first mailbox (see Fig: 3). Click "arrow" button at the upper left corner of the interface, a tab page named "New mailbox" appear (see the figure below).

1.2.6) Fifth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (30484e4b99137df3...)

Fig. 4: E-mail specific settings interface.

Mailbox account setup. Click the pencil button (see Fig: 3) to open the setup dialog. The system provides common account parameters for a list of some of the well known e-mail service providers. It is automatically updated online. For those ones, a user can simply choose one or more from them and the specify the corresponding personal user name and password. For those that are not on the list (yet), one has to provide account parameter details in the details setting panel, which is shownwhen the user click the "Show Details" button at the bottom (see Fig: 4). Most of the mainstream online e-mail service provider supports POP3 mail message download, there should be a link to the account setup page. Some service provider requires a user to open up POP3 download manually, some does it by default. Login you e-mail account, and try to find a page regarding POP3 client configuration. If it is there, it should contain relevant information for this program, like the address for the POP3 server and whether or not it supports SSL, etc.. After all the information is gethered, one should type them in in the corresponding box in Fig: 4 Name
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (49f236ae1d5c3c33...)

"Name": You can give any name to you mailbox as long as it can be used to distinguish it from other mailboxes. For example, "Gmailbox A"。 Host
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (a5fdc5020b1cafe9...)

"Host": It is the internet address of your mailbox server. This information should be able to be found inside the account setup page of your mail account. For example, the one for Gmail is "". Then one should type in the user name and password for the corresponding account. Choose to check the "Remember" checkbox on the right. This allows the system to keep the password for you so that you do not need to enter it every time it is needed. Port
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (78fe64fb6d2d461c...)

"Port": As long as the remote service provider supports, one should choose to enable SSL by checking the "Enable SSL" checkbox. When it is checked, the value for the "Port" becomes 995 by default. If your service provider specifies a different number, use that number for the port. Some service provider does not support SSL, in which case the value for the "Port" is set to 110 by default. If your service provider specifies a different number, use that number for the port. When not enabling SSL, your password will be send in plain text, which could be intercepted by others without difficulty. Save To
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (0e372e44306d3f9e...)

"Save To": It is a sub-directory name under the root mail storage directory created in the initial setup. If not specified, the name of the mailbox specified in the first line will be used. The values inside its dropdown window are the existing sub-directories. If there is no special reasons, do not use an assigned subdirectory name for a mailbox. Timeout
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (8f4bc7d535fcc5db...)

"Timeout": It is the longest time it takes to wait on reading data from remote mailbox. It could happen that when a user is reading data, certain problems arise and the transport of data stops, but the connection is still not broken. In such a case, the corresponding tab page of the mailbox allows no further operations on it and effectively appears to be "dead". A non-zero value (in seconds) can be selected to allow the said tab page exit from such a state after the specified seconds. if needed, a user should choose a proper value according to the internent connection speed of his/her. Session Expires
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (df390e1813f9134c...)

"Session Expires": After a user sign-in his/her e-mail account, he/she is in sign-in state. This is the longest time he/she will stay in such a state when there is no activities. There is usually a session expire time on the remote side, which is normally unknown to the user. The actual expire time is the minimum of the two.

1.3) Basic Usage
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d41d8cd98f00b204...)

1.3.1) First
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (a834cde823f3bee1...)

Fig. 5: Check e-mails buttons.

Press the "Check Mails" or "Check All Sites" button to check mail messages (see Fig: 5) If it is the first time, all the e-mail messages in the corresponding remote Inbox will be downloaded. If the mailbox contains a lot of messages, it could take some time. After the initial download, only the new messages or the ones whose local copy was deleted will be downloaded.

1.3.2) Second
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (91ba0ae3d90ae04e...)

Parallel processing of mailboxes. When there are multiple mailboxes registered, a user can choose to check his/her e-mails individually or collectively. There is an "Check Mails" button on each tab page of an e-mail account. When this button is pressed, only the corresponding messages of that that account who do not have a local copy will be downloaded. There is also a "Check All Sites" button on top. Pressing this button, the system will check each account in parallel, making full use of the multi-core and broadband capabilities that comes with popular computing devices of today.

1.3.3) Third
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (38c3c0d72901fc48...)

Persistence and restoration of a mailbox group. The "Saved Account Group" menu has two menu items, which can be used to save or load account group settings.

1.3.4) Fourth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (f816b2650baba2fd...)

Fig. 6: Saving mailbox group settings to a named file.

Click the "Save Settings" menu item to save the settings of the currently working mailbox group (see Fig: 6). Find a directory to put the configuration file, then give the file a meaningful name. Later on, when the file is loaded, the current mailbox group will be restored.

1.3.5) Fifth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (2f31a4708d7b191a...)

Fig.7: Loading mailbox group settings from a named file.

Click the "Load Settings" menu item and select a saved setting file (see Fig: 7). After opening it, your previously saved mailbox group will be restored. Any number of different mailbox groups can be setup and saved, as long as the name of the setting file is distinct.

1.3.6) Sixth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (14ff40af52ef8e12...)

Fig. 8: The tab of a mailbox.

Click the corresponding tab to show the corresponding tab page of an e-mail account.

What are shown on the tab are the online login status, name and a collection of edit buttons. The left most dot shows the logged in status of the user. When the user was logged in and no operation is going on, it will be green. When the logged in or some operation is under way, it will be red. In any other case, it will be gray. The "pencil" button is used to open the setting editor of the corresponding mailbox. The red cross button is used to delete current mailbox from the group. When the current user is currently connected to the remote mailbox and left most dot is green, the user can press it to logout of the account and disconnect from the mailbox (see Fig: 8).

1.3.7) Seventh
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (443d8e17eeb3c9f1...)

Fig. 9: Mailbox tab page structure.

There are two sub-tab pages in a tab page of a mailbox. The "New Messages" page list those messages that are gathered in the last download. The "Old Messages" page contains those messages that are already downloaded, including those listed in in the "New Messages" page, which are decorated in red. Both of them has an operation band on top. The operations on the "New Message" page are mainly for downloading new messages whereas in addition to these, the ones on the "Old Message" page are also for operations on the set of messages that are already downloaded.

A downloaded message can be in three state: 1) it's remote copy has not been deleted; 2) it's remote copy had already been deleted, only local copy is present; and 3) the local copy was deleted but the remote copy is present.

The "Downloaded Messages" tab page inside "Old Messages" list the messages for which both remote copy and local copy are present and the "Other Local Messages" page list all those messages whose remote copy had already been deleted (see Fig: 9).

The processing of mail messages starts when a user presses the "Start Processing" button. But before processing, a user needs to specify 1) what is going to be performed on the messages (the action), 2) what is the target and 3) which messages are going to be affected by the action. The processing is meaningful only after these aspects are specified.

The current version of the program supports only "delete" action. The available targets are listed inside the dropdown boxes to right of the "Default Target". It includes "Remode Copy", "Local Copy" and "All Copies". One of them should be selected as the target. For example, when the target is "Remote Copy", the action only affects the remote copy of a selected message. The meaning of the two targets is also obvious. Here the default target can be overridden as long as the user selects a non-empty and different target inside the dropdown window of a particular message.

The left most checkbox for each message in the list is used to select it for operation. For those users who seek convenience, the three buttons on the top band can come in handy, which are "Select All", "Deselect All" and "Revert Selection". They only affect the selection status of the messages in the current message page. The selection status will not be changed when the user changes a message page so that item selection can be set across message pages before processing. As an example of their usage, let's suppose that a user wants to delete most of the messages on a page, he/she could first select all messages and then uncheck those small number of them which are to be kept.

A side note: 1) if a user delete only a local copy of a message, it will reappear after the next download; 2) after the user start the program and before the first download, all messages will only be shown inside the "Other Local Messages" tab page since information about their online presence has not been gathered. The second characteristic is a limitation of the current version of the program, which will be improved when newer version of the same system is released.

1.3.8) Eighth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (6d2689e64c77e40c...)

Fig. 10: Reading an e-mail message.

Reading messages (see Fig: 10). User can read a downloaded e-mail message briefly. It can be done by pressing the leading buttons of the first two properties of the messages (see the figure below), which will open up a simple e-mail message reader. It usage is similar to the full e-mail reader described below.

1.3.9) Ninth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (8ea81cca6100dd52...)

Fig. 11: Browsing mail interface.

Pressing the "Read Mails" button on top of the program, an e-mail message manager appears (see Fig: 11). The left side of the program is like what you see in a file browser. When expanded, all of the sub-directories allocated for corresponding mailboxes and their sub-directories are shown. Select "All Files Contained" on the top portion of the program will allow you to start browsing all of your e-mail messages, organized in paged form. Initially, these e-mail messages are ordered according to the time they are received, from the newest to the oldest messages. A user can also choose to order the messages according to some other property of the messages and/or direction (details are presented here).

When a e-mail message is selected, it's properties and content will be display on the right hand side of the manager, which provides a kind of preview (see the above figure). If a user would like to read in a more detailed manner, he/she could press the expand button on the right, which opens the e-mail message reader (see the figure below). When the reader is opened, the right hand side will not display information about the message until the reader is closed.

An e-mail message has two display modes which is determined by the "Brief View" checkbox on top of the message content. The first is the "Brief View" mode. In the brief view mode, only the tab pages related to the message's content are shown, tab pages containing other information about the message (like the message's raw data, the routing information, etc.) are hidden. In the non-brief view mode, tab pages containing many other information pertaining to the message are also shown.

The content of a message are separated into two categories, namely the textual content (including embedded media, if any) and attachments.

A tab page is dedicated for attachments. If there is no attachment, this tab page will not be visible. E-mail messages are presented in plain text in the early days, however decorated e-mail messages in the form of multimedia document are getting increasingly more popular nowadays. There can be a variety of forms that an e-mail message can be in: some has only plain text part, some has only multimedia part and the more formal ones prepared by popular service providers of today contains both forms. A user can in principle to decide which to read (some users prefer reading plain text messages due to security reasons). The present program present all forms contained in an e-mail message to the user to let him/her to choose. However, the plain text one is pre-selected by default if possible.

For those attachments that are images, a user can select them to preview them in the tab page of attachments. However for those images whose origin are not certain, it is advised not to do so. If you do decide to preview them, proper pre-cautions should be taken.

1.3.10) Tenth
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d60200b9aa76e1df...)

Fig. 12: Full featured e-mail reader.

E-mail message reader (see Fig: 12). The figure shown below is a snapshot of the reader in the non brief view mode. The message contains both plain text representation and multimedia one so that a user can read any of the "Text, Multimedia Text, Raw and Other Aspects", as long as there is a need. On the left hand side, there is a dialog sequence tree display panel(see here). The entire content inside the read can be manified or reduced at the lower left corner of the reader.

1.4) Advanced Usage
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (0a81c9d1830ca7ad...)

Due to the fact that the present program aggregates e-mail messages from multiple mailboxes and presents them in a flat fashion to a user, a need could arises when the number of accumulated messages becomes large enough as to how to classify, sort, filter, and eventually, to restructure (the classification of) these messages in a more sensible way. This chapter introduce various methods available using which these messages can be managed dynamically. The system parses each e-mail message when it is loaded into certain structure. It allows the user to perform structured sorting and query against them with the help of the intelligent input system inside present program. Structured sorting and query can generate much more accurate results than those by the popular non-structured query nowadays, that an user can utilize to meet his/her higher-end needs. Better yet, the sorting, filtering and classification are expression based so that when the rules are set, new messages will be classified dynamically without the need for a user intervention. Query and sorting of e-mail messages are performed inside the e-mail browser. It can be opened in the main window by pressing the "Read Mails" button (See details here).

1.4.1) Detailed sorting of messages
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (612d70544c1ca258...)

Besides the basic sorting (details) functionality, the present program is capable of providing means for the user to control the sorting in a much finer manner. Consider the following scenario, say A. Brown (the sorter) would like to order his e-mail messages according to the name of sender in an ascending order. Because the same person (e.g. C. Davis) can send e-mails from different e-mail addresses of his/her, the sorter want to arrange to have all e-mail messages from the same person ordered according to his/her sending e-mail addresses, in ascending order again. After doing that, the sorter find further ordering is necessary, e.g. order those e-mail messages with the same sender and the same sending e-mail address according to the time they were received, or the sorter's receiving mailbox, in certain order, etc.. These tasks can be accomplished easily, there is in principle no limitation on the fineness of the ordering until every single messages are ordered according to the sorter's will.

Fig. 13: Detailed sorting of e-mail messages.

Sorting starts with selecting the leading sort property (see Fig: 13). It is selected inside the dropdown window next to "Sort By" of the e-mail browser (see the figure below) it's order is determined by the check box on it's right. There is a arrow button on the right of each property inside the dropdown window. Pressing this arrow button opens the ordering selection tree dialog. The first generation of this tree represents the available properties to select after the leading sort property. The next generation represents further detailing property selection options for the sorting against the previous generation, and so on and so forth. It is not enough just expanding the tree, one must select a tree node. When a user selects certain tree node at certain generation of the tree, it sets a refining sorting sequence determined by the path from the leading sorting property to the selected property. For example one can sort according to "Received At" then "To" then "Known As" then "From" properties (ignore the ordering problem for the time been), as shown in the following figure. The ordering of each property is determined by the value inside the drowdown box next to it on the right (the default is ascending).

Fig. 14: Shortcuts for detailed sorting of e-mail messages.

There are more convenient ways to sort for some frequently used e-mail properties using the e-mail browser (see Fig: 14). Some column header can be used to display the current sorting state and to sort the corresponding e-mail property. The name of the currently sorted property is displayed in bold font; There is a red dot to the left of the name; To its right, there is an arrow indicating the direction of sorting. When clicking a column header that is not currently sorted, the corresponding property becomes the currently sorted; further clicking (on the sorted header) changes the direction of the sorting. Detailed sorting sequence dialog can be opened by pressing the right most arrow button. For example, as shown in the following figure, the user selected "Received At" as his/her leading sort property and "Known As" and "Subject" as ever detailing sort properties.

1.4.2) Detailed query of messages
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (8db3514fa89ae7cf...)

As the number of accumulated e-mail messages becomes larger and larger, most people will gradually be lost inside the multi-sourced messages ordered according to the time they were received. How to pick out the correlated ones they want to read at the moment, e.g. the ones from Charles Davis, will become a need. The filtering functionality of the present program can not only help a user to find e-mail messages instantaneously, it can also be used to provide dynamic primary classification of them, in which the user is empowered to reuse some of the useful filter expressions established in the past to classify the likely changed the e-mail message set at the moment and in the future next to it.

The filtering requests are answered by the system by having the user to input filtering expressions which are interpreted to generate filtered message sets to the user. A filter expression is composed of elementary filter expressions and/or sub-filter expressions embraced by round brackets () connected by logic 'and' and logic 'or' operator.The sub-filter expressions have the same pattern. The filter expression generator of the present program can help user to produce filter expression of arbitrary complexity. But for those who are less experienced in it, they can try to produce and use the elementary filter expressions first. The program is capable of translating the filter expressions into natural languages so that if a user can think logically in their daily life, it would not be hard for them to generate a filter expression of comparable complexity, which could be enough for his/her needs. For example, something like "the sender's name contains "Davis" and the sending address contains '' or the sender's name contains 'Brown' and the sending address contains ''".

For those first time user of systems of similar nature, the primary difficulties are not in logic part, but are in how to start a meaningful interaction with the system from the very start by constructing expressions that not only can be accept by the system but also expresses the user's indention correctly when interpreted by the system. For this to happen, it traditionally involves forcing the user having adequate knowledge of a new language (for the expression) before getting useful results. The present system has an intelligent input guiding system that significantly reduces the learning curve for the user because the computer takes a major part of the learning responsibility away from user to become a proactive agent in the production process that provides options for user to choose from so that only correct expressions can be produced. The user's responsibility is on the logic part, namely how to formulate a logic that get the intended filtering.

Fig. 15: Production and usage of filter expressions.

The filter expression generator can be opened by pressing the down arrow button to the right of "Filter" (see Fig: 15). The drowpdown window on the upper right corner contains named filter expression that are previously saved. In addtion to input a filter expression every time it is needed, a user can also choose from this list if what is needed is already there.

Fig. 16: Naming of a filter expression.

After opening the filter expression editor, please pay attention to the text box next to the "Save as" (see Fig: 16). If the user would like to save the filter expression generated in the current session, he/she must give it a descriptive and unique name in this text box. Unnamed filter expressions are one-times only and can not be saved.

Most input in the filter expression editor can be accomplished by three keys: namely the right arrow key and the up and down arrow key. Depending on the input state, the right arrow key can be used to query for options or when the option window is open, select an option from the list. When the options window is opened, the up and down arrow key are used to change the candidate option that is to be selected.

Fig. 17: The production of a elementary filter expression.

When it is time to edit, the user should click on the edit window to let it has focus (see Fig: 17). When the user press the right arrow key, a option popup window appears containing the available properties of the e-mail messages to choose from. Now the up or down arrow key can be used to change the candidate property, e.g. the "From" property, which is selected using the right arrow key again. Now a "MsFrom" (subject) string is outputted and the options popup window disappears. See the following figure. What predicate to use should be considered next. Press the right arrow, available predicates appears. Select one like before from them, e.g. "contains". After the selection, the system displays a tooltip below telling the user to type in a string enclosed by quotation marks. The user can type in one that is relevant to him/her, e.g. "". After finishing the string, a elementary filter expression is produced. The user can push the "Generate" button to view the natural language translation of the expression, which is [From contains ""].

When it is needed, a user can follow the editor's guidance using logic 'or' (inputted as '||') or logic 'and' (inputted as '&&' ) to join these elementary filter expressions together to realize more refined filtering. More sophisticated formulation (of filtering logic) involves the use of round brackets '(' and ')' to embrace the above mentioned expressions to form sub-filter expressions, which are joint together with the elementary filter expressions by logic 'or' or 'and' to form composite filter expressions. For example the filter expression '!(MsgFrom contains "" || !(MsgFrom contains "")) || MsgFrom contains ""', [namely, not (From contains "" or not (From contains "")) or From contains ""]. A user can use the program depending on his/her level of understanding of logic and the corresponding ability of expression, combined with sorting, to suit his/her own needs, there is simply no unique way of doing it. There is in priciple no limitation on the comlexity of the expressions.

Besides the intrinsic properties of a e-mail message, a user can also use other two properties to formulate his/her filter expression. The first one is "FolderRef." (which means the "Folder's") properties, which contains the intrinsic properties of a folder and it's parent folder's properties, etc.). The second one is "ReferencedContent" (namely, the message's content). When the user finish input "ReferencedContent", the system will guide the user to type in the keywords to search for and the pages needed to be retrieved to query the existing messages, very similar to the search method on the web. For example, 'ReferencedContent matches keywords { "abc" } first100' [namely, first 100 of the messages matching keyword { "abc" }]. Unfortunately the current edition and version of the program does not enable search over content. It will be in the future, which will allow a user to combine multiple content keyword search and e-mail meta information search described above in a composite filter expression to meet his/her higher end needs.

A few words about the time zone representation convention: the date-time input guide (a text based calendar) requires the user to end a date-time expression by selecting either 'Ltc' or 'Utc'. 'Ltc' indicates the inputted date-time is local time, like Pacific Northwest time, which is dependent on the geo-location of the user. 'Utc' indicates the inputted date-time is a universal time, which is not dependent on a user's geo-location. They have different meaning when they are used to present certain instance, so care should be taken.

1.4.3) Display current sorting and filtering status
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (fda3b0a74a79e60d...)

Fig. 18: Current sorting and filtering status.

As it is shown in the following figure, sorting and filtering status can be shown/hidden by clicking on the arrow button inside the yellow circle (see Fig: 18).

1.4.4) View message dialogue sequence tree
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (67f46eafca3a42bc...)

Fig. 19: The display of dialogue sequence tree.

Correlated e-mail communication is most likely a group of e-mail dialogues on certain topics between users. It starts with an initial message. The receiver(s), which could answer the currently received message one or more times or an old message one or more times. This generates a complex dialogue sequence tree. Because the user may send or receive other un-related messages during the dialogue live time, these correlated message group will interweave with each other. It requires a user to mentally reconstruct the dialogue process, which is hard and un-productive. Most e-mail clients have no means of displaying a group of correlated messages. Although Gmail is capable of gathering the correlated messages, their flat way of organizing them in a list, base on certain un-published rules, is for the most of times confusing, especially when the dialogue tree becomes sufficiently complex.

The present program can recover the dialogue sequence tree completely, like what is shown in the following figure. Using such a functionality, a user can extract amongst the interweaving messages groups the correlated ones only and display them in a tree form showing the dialogue sequence. As long as the user select a message, all messages belonging to a correlated dialogue group will be extracted and displayed on the left hand side of the message reader, as shown in the following (see Fig: 19).

Because the present edition and version of the program is using POP3 protocol to download messages, which is quite limited, only those messages from Gmail mailbox contains complete dialogue information (due to the fact that Gmail did not follow the old convention or tradition exactly). In the future enhanced edition and version of the program, the present feature will be available for most of the mailboxes on the market.

1.4.5) Mailbox group management
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (8ae7026a3f78d9bb...)

The present program can in principle manage all mailboxes of a user. The introduction of it, however, make it possible for a user to create more online e-mail accounts for a variety of purposes. Therefore it is quite possible that there is a need to have multiple mailbox groups, e.g., one for work, the other one for private life and yet a third one for strangers, which are likely to be well separated. This can be done in the current version of the program by using the "save" and "load" mailbox group settings functionality.

1.4.6) Security measures in unsafe environments
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (4d25025b17645cbe...)

"Unsafe environments" refers to the use of those systems which the user either shares with other ones or have no administration privileges.

1. Because the settings for the current mailbox group is saved into the hard disk of the system when the program exits normally, it can not be carried away by the user. It is suggested to setup an empty mailbox group and save it to a configuration file. When the user needs to exit inside a unsafe environment, he/she should load the empty mailbox group first before hitting the exit button. There will be no private information left on the system after exiting using this step. Since there is no setting file, it wouldn't be useful for other's even if he/she knows your master passphrase.

2. E-mail storage directory should be located on a user's own mobile disk.

1.5) FAQ
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d41d8cd98f00b204...)

1.5.1) How to change the message storage path?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (26424d71c004af85...)

Fig. 20: Modifying the root message storage path.

Push the "browse system directory" button and select an existing or newly created folder (see Fig: 20). The selected folder will be the root folder for all e-mail messages downloaded from the collection of mailboxes. It has to be set before carrying out any other operation.

1.5.2) How to set a master key for a mailbox group?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (ee7d6d8038da3b42...)

Fig. 21: Loading the master key for the mailbox group.

The master key for the mailbox group is unloaded automatically after a certain period of time. It is indicated by the appearance of a "lock" button at the upper right corner of the program. Click the button will bring up the load master key dialog box (see Fig: 21). If a correct passphrase is provided, the master key will be reloaded. Details.

1.5.3) How to create a new tab page for a mailbox?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (e325a6745ff35ba2...)

Fig. 22: A new tab page of a mailbox.

Click the "arrow" button on the top left corner of the program to create an empty tab page, the properties of the tab page should be initialized immediately afterward so that it is bound to the remote mailbox (see Fig: 22). Avoid creating multiple tab pages for a mailbox if possible since it wastes resources of yours and the public.

1.5.4) How to initialize a tab page of a mailbox?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (2d03bf6b8083276d...)

Fig. 23: Settings for a tab page of a remote mailbox.

Click "pencil" button to open the POP3 settings dialog and fill the needed information (see Fig: 23).

1.5.5) How can I check for new e-mails?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (d4fab7ca9acbb8c9...)

Fig. 24: Checking for new e-mail messages.

Clicking on the left "Check Emails" button for each tab page of a mailbox to start e-mail downloading (see Fig: 24). One can also click the "Check All Sites" button on top of the program to download e-mails from all registered mailboxes.

1.5.6) Why my e-mails do not start to download?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (cd7a391107611c5c...)

Most of the mainstream online e-mail service provider supports POP3 mail message download, there should be a link to the account setup page. Some service provider requires a user to open up POP3 download manually, some does it by default. Login you e-mail account, and try to find if the POP3 e-mail download is enabled.

1.5.7) How to delete a tab page of a mailbox?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (2b2b00af1cddfe11...)

Fig. 25: Deleting a tab page.

Click the red "crossed out" button on the tab of a tab page to delete it (see Fig: 25).

1.5.8) How to view all messages?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (139323b0c68b16f2...)

Fig. 26: Browsing, sorting and filtering of e-mail messages.

Click the "Read Mails" button on top of the program to open an e-mail message manager (see Fig: 26). The left side of the program is like what you see in a file browser. When expanded, all of the sub-directories allocated for corresponding mailboxes and their sub-directories are shown. Select "All Files Contained" on the top portion of the program will allow you to start browsing all of your e-mail messages, organized in paged form.

1.5.9) The display area is too small, how to read messages in a larger window?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (424165ece56c0b63...)

Fig. 27: Opening of an e-mail reader.

The “Brief Info" tab page on the right-hand column has a message display area inside its lower part for brief reading, attachment saving, etc.. If one need to inspect the message in more details, there is an expansion button on the right of "Brief View” checkbox (see Fig: 27). It can be used to open a e-mail message reader for the user to read messages in a larger window.

1.5.10) How to remove an e-mail message?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (b0b808df268bee53...)

Fig. 28: Deletion of e-mail messages.

A e-mail message has only one copy before downloading, which can not be deleted by the present program (see Fig: 28). After downloading, it has two copies initially, namely the one in the remote mailbox plus the one saved under the message storage path. One must specify which one copy or all copies should be removed. This is performed inside the "Old Messages" sub tab page of the tab page of a mailbox. See here for details.

1.5.11) How to save and re-load settings for mailbox group?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (63b52ec932aa94d6...)

Fig. 29: Mailbox group settings retention and loading.

The program can save and re-load settings for the current mailbox group (see Fig: 29). It is achieved by clicking the corresponding sub-menu item under the "Saved Account Group" menu on top of its main window. See save and load for details.

1.5.12) How to manage mailbox groups effectively?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (8a42a07ad1eb6cc5...)

One can use the above mentioned method to save the settings of a mailbox group into a meaningfully named files. One of these files can be loaded depending accordingly. See management and security for details.

1.5.13) How to realize mailbox group mobility?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (bab8787f98cfcc4f...)

The saved settings file of a mailbox group can be copied to a mobile disk (including thumb disks) which is to be brought to other computer. The corresponding mailbox group will re-appear after loading a settings file. If there is no message storage folder on the new computer or if the mobile disk has a different label on the new computer, the path to the folder has to be modified accordingly. The program will download those e-mail messages that are not present inside the message storage folder from the remote mailboxes, if the folder path is correctly set. Note that if the computer is public or shared or not under the effective control of the user, it is best to keep the message storage on a user's own mobile disk.

1.5.14) How to recover from incorrectly displayed multimedia text content?
last-scan: Sat, 01 Dec 2012 02:35:31 GMT (a9c5b30194333154...)

Some non-standard complying mail clients generate incorrectly encoded messages in languages other than English. While the program tries to cope with the situation, it could happen that we have not cover all the cases yet. When that happen the displayed message appears to be random codes that hard to discern. There are two cases, one is the message is transmitted correctly by the message viewer does not decode the message using the correct decoder and the second is the message is not correctly transmitted from the server to the client at all. The first case can easily be corrected by changing the "Encoding", which can be seen by right click on the content area. What encodings are allowed will be depend on the language of the content. There is no way to recover from the second situation since relevant information had been lost during the transmission.