Solved

receive Netcom e-mail through Eudora

Posted on 1997-12-21
3
379 Views
Last Modified: 2006-11-17
As a follow-up to my recent question, how do I configure my Eudora Light to receive my Netcom e-mail? The reason I want to is that I occassionally receieve e-mail in MIME format, and Netcom cannot convert them.  Instead, I get an unconverted block of text (symbols) in the regular body of my e-mail message.

I'm using Netcom NetCruiser 2.1.1 and I have Eudora Light 1.5.2.

Here are some Eudora settings that might be pertinent(?):

Getting Started
POP account - my netcom e-mail address
Real name - my real name
Connection method - offline (no connection) is *not* checked

Hosts
SMTP: smtp.ix.netcom.com
ph: (blank)
Finger: (blank)

Checking Mail
Authentication Style - Passwords radio button is chosen

--C

0
Comment
Question by:clara
  • 2
3 Comments
 

Author Comment

by:clara
ID: 1017367
I was able to set up Eudora to retrieve messages from the Netcom server (I had a small mistake in the POP address).

Now Eudora says the file has been decoded and lists the pathname. When I go to read the file, it's still in hieroglyphics.  Is it possible that Eudora can't convert the file because it came through Netcom? Isn't Eudora supposed to be able to convert MIME files?

--C
0
 
LVL 11

Accepted Solution

by:
singleton earned 50 total points
ID: 1017368
When you say it is in hieroglyphics do you mean all sort of wierd
characters, not just letters, numbers, and a few special characters?  If so it sounds like it was converted, and is now
in binary format.  What extension does it have?  If you want
you can send me the file by email to djs@ionet.net and I will
see what it is
0
 

Author Comment

by:clara
ID: 1017369
Thanks, singleton! It turns out I just needed to unzip it!  I just needed to know what state it was in - I didn't know it was already in binary format.

--C
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is about my first experience with programming Arduino.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Edureka is one of the fastest growing and most effective online learning sites.  We are here to help you succeed.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now