Solved

Problem with popclient or Pine

Posted on 1997-06-19
4
335 Views
Last Modified: 2006-11-17
Popclient puts mail in a file in my home directory. I then
use Pine to read it. For every one real message, there is
another dummy message. Popclient reports one; Pine reports
two. The dummy has no subject and no header. How can fix
this problem.
0
Comment
Question by:ffox
  • 2
  • 2
4 Comments
 
LVL 2

Accepted Solution

by:
e4monsch earned 100 total points
ID: 1626386
You could move the downloaded mail from popclient directly into
the /usr/spool/mail/account-name. I do it this way; works quite well. I have shellscript ready for this.

If you have any further question regarding this feel free to call up again.

Regards Ian

0
 

Expert Comment

by:hhasert
ID: 1626387
I had the same problem. I switched to 'fetchpop' and the problem disappeared. 'fetchpop' is also easy to run as a daemon process and encypts your userid/password in the '.fetchhost' file.

I seem to remember that I wrote directly into /var/spool/mail/account but I'm not sure (I switched to fetchpop and threw away the rest). What I do remember is that I tried another provider (free trial and I'm Dutch) where the problem with fetchpop didn't appear.
0
 

Expert Comment

by:hhasert
ID: 1626388
I had the same problem. I switched to 'fetchpop' and the problem disappeared. 'fetchpop' is also easy to run as a daemon process and encypts your userid/password in the '.fetchhost' file.

I seem to remember that I wrote directly into /var/spool/mail/account but I'm not sure (I switched to fetchpop and threw away the rest). What I do remember is that I tried another provider (free trial and I'm Dutch) where the problem with popclient didn't appear.
0
 
LVL 2

Expert Comment

by:e4monsch
ID: 1626389
Shell I send you my shellscript for popclient?

Regards Ian

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now