Set the master key. There is one master key for each email account group. It is used to unlock the password safe for the acconts inside the group so that a user do not have to memorize or input the passwords each time he/she want to open his/her emailboxes. Each time when an email account group is created, a master key setting dialog box is shown asking the user to set the master key (see Fig: Setup the master). Since it is the only passphrase one needs to remember, make it sufficiently difficult for others to guess.
First download the installation package and install.When the installation program prompts the user to install the above mentioned runtime environment, let the program to install them automattically, unless you have enough knowledge to know what you are doing.
Second specify a root mail storage path. Push the "browse system directory" button to select a path for the root storage. One can choose to point it to neither a pre-existing directory or a newly created one (see Fig: 1). This directory is the root storage directory for messages of all mailboxes in a given mailbox group.
Then create a master key. Push the "key" button (see Fig: 2) located at the upper right corner of the window to create a master key. A new dialog box pops up in which a user can enter a passphrase. Since it is the only passphrase one needs to remember, make it sufficiently difficult for others to guess. The master key is used to open the lock that secures all of passwords belonging to a given mailbox group so that a user does not need to enter the password for each mail account every time he/she needs to login. It also creates a manageable mean for the user to set strong, distinct and frequently changing password for each of his/her mail account. The user's online identity and information security improves in doing so. Of course the user has the responsibility to properly safe keeping his/her master key and mailbox group configuration files. Because of the fact that it is not necessary for them to be passed around over the internet, the said mean overcomes one of the bigger security weaknesses the presented today. But the same mean does not make it more secure than any other means on any other aspect of it usage. For the other aspects, a user should use his/her own caution and security measures (e.g. preventing key loggers from recording the master key passphrase, preventing the mailbox group configuration files from been stolen or lost, etc.).
The master key will unload together with all of the passwords for the mail accounts after it loading to improve security.
That is why the system will ask the user to re-authenticate himself/herself after awhile when the user perform operations.
Setting up the first mailbox (see Fig: 3). Click "arrow" button at the upper left corner of the interface, a tab page named "New mailbox" appear (see the figure below).
Mailbox account setup. Click the pencil button (see Fig: 3) to open the setup dialog. The system provides common account parameters for a list of some of the well known e-mail service providers. It is automatically updated online. For those ones, a user can simply choose one or more from them and the specify the corresponding personal user name and password. For those that are not on the list (yet), one has to provide account parameter details in the details setting panel, which is shownwhen the user click the "Show Details" button at the bottom (see Fig: 4). Most of the mainstream online e-mail service provider supports POP3 mail message download, there should be a link to the account setup page. Some service provider requires a user to open up POP3 download manually, some does it by default. Login you e-mail account, and try to find a page regarding POP3 client configuration. If it is there, it should contain relevant information for this program, like the address for the POP3 server and whether or not it supports SSL, etc.. After all the information is gethered, one should type them in in the corresponding box in Fig: 4
"Name": You can give any name to you mailbox as long as it can be used to distinguish it from other mailboxes. For example, "Gmailbox A"。
"Host": It is the internet address of your mailbox server. This information should be able to be found inside the account setup page of your mail account. For example, the one for Gmail is "pop.gmail.com". Then one should type in the user name and password for the corresponding account. Choose to check the "Remember" checkbox on the right. This allows the system to keep the password for you so that you do not need to enter it every time it is needed.
"Port": As long as the remote service provider supports, one should choose to enable SSL by checking the "Enable SSL" checkbox. When it is checked, the value for the "Port" becomes 995 by default. If your service provider specifies a different number, use that number for the port. Some service provider does not support SSL, in which case the value for the "Port" is set to 110 by default. If your service provider specifies a different number, use that number for the port. When not enabling SSL, your password will be send in plain text, which could be intercepted by others without difficulty.
"Save To": It is a sub-directory name under the root mail storage directory created in the initial setup. If not specified, the name of the mailbox specified in the first line will be used. The values inside its dropdown window are the existing sub-directories. If there is no special reasons, do not use an assigned subdirectory name for a mailbox.
"Timeout": It is the longest time it takes to wait on reading data from remote mailbox. It could happen that when a user is reading data, certain problems arise and the transport of data stops, but the connection is still not broken. In such a case, the corresponding tab page of the mailbox allows no further operations on it and effectively appears to be "dead". A non-zero value (in seconds) can be selected to allow the said tab page exit from such a state after the specified seconds. if needed, a user should choose a proper value according to the internent connection speed of his/her.
"Session Expires": After a user sign-in his/her e-mail account, he/she is in sign-in state. This is the longest time he/she will stay in such a state when there is no activities. There is usually a session expire time on the remote side, which is normally unknown to the user. The actual expire time is the minimum of the two.