Residential Internet Frequently Asked Questions

The type of mail server that we use is a POP3/IMAP4 server.
The incoming mail server is
The outgoing mail server is
Incoming Port(POP) is 995 SSL Enabled.
Incoming Port(IMAP) is 993 SSL Enabled.
Outgoing Port is 587 STARTTLS or 465 SSL.
Username is Your Full Email.
Password is The Password provided.
If your Client is asking for Outgoing server Authentication, Make sure this option is selected.

1. If your e-mail client (Outlook, Outlook Express, Windows Mail, etc.) is continuously giving you a prompt for username and password info, do the following: in the user name field put your full e-mail address. Ex.

2. If you cannot log into webmail, go to to login or call the Internet Support Team.

Eagle Communications Internet Support Team


If you have forgotten your password,you will need to call the internet helpdesk, at 785-625-9900 or 877-625-9901. For security reasons the helpdesk employees cannot look at your current password; they can only reset a new password.

One very easy way to avoid spam e-mail is avoid entering your e-mail address on the Internet. If you do so, many times the website will share your email address with other sites, and they will send you unwanted e-mail.

If you are getting spam e-mail, there are several spam filtering products that are available. These products will screen your e-mail for you, greatly reducing the amount of spam you receive.

Every time you forward e-mail, there is information left over from the people who received the message before you, namely their e-mail addresses and names. As the messages get forwarded along, the list of addresses builds and builds. All it takes is for one person to get a virus, and his or her computer can send that virus to every e-mail address that has come across his computer. Or, someone can take all of those addresses and sell them or send junk mail to them in the hopes that you will go to the site.

How do you stop it? Well, there are several easy steps:

  • When you forward an e-mail, DELETE all of the other addresses that appear in the body of the message (at the top).
  • Whenever you send an e-mail to more than one person, do NOT use the To: or Cc: fields for adding e-mail addresses. Always use the BCC: (blind carbon copy) field for listing the e-mail addresses. That way the people you send to will only see their own e-mail address. If you don't see your BCC:, option click on where it says To: and your address list will appear. Highlight the address and choose BCC:. When you send to BCC: your message will automatically say "Undisclosed Recipients" in the To: field of the people who receive it.
  • Remove any "FW :" in the subject line. You can re-name the subject and even fix spelling if you wish.
  • ALWAYS hit your forward button from the actual e-mail you are reading. Ever get those e-mails that you have to open 10 pages to read the one page with the information on it? By forwarding from the actual page you wish someone to view, you stop the recipient from having to open much e-mail just to see what you sent.
  • Don’t sign or forward any e-mail that is a petition. Typically, these types of e-mail state a position and ask you to add your name and address and then to forward it to 10 or 15 people or your entire address book. The email can be forwarded on and on and can collect thousands of names and email addresses. A completed petition is actually valuable to a professional spammer because of the wealth of valid names and email addresses contained therein.
  • Don’t forward e-mail make far-fetched promises if you will. Something like, “Send this email to 10 people and you'll see something great run across your screen." The teaser (the promise that will happen if you forward the e-mail along) will not happen.
  • Before you forward an Amber Alert, a virus alert, or other e-mail containing “important” information, always check the accuracy of the facts. Most of them are junk e-mail that have been circling the Internet for years! A reputable resource for checking the accuracy of forwarded e-mail is is an Internet reference source for checking urban legends, folklore, myths, rumors, and misinformation.

Yes, you can. Go to Put in your e-mail address and password and then click login..

Microsoft has made available for free download their newest mail client: Windows Live Mail.

You can download it here:

For directions on setting up your email account in Windows Live Mail, see our support documents section below.


The primary DNS address is .
The secondary DNS address .

You will need to provide an Internet-accessing digital device, such as a computer, iPod, Blu-ray DVD player, gaming system, etc. Eagle Communications will provide the necessary cable modem and other required digital equipment.

Yes, you can share your connection. If you want to share, you will need either an Ethernet switch or a broadband router. A switch will simply split the connection (for up to 3 computers). A router will also split the connection, but will allow as many computers as you want to access the Internet. A router will also provide the security of a firewall, and provide file and printer sharing capabilities. Both items are available for purchase from Eagle Communications.


The best way to prevent a virus is to purchase and run a virus protection program, such as McAfee or Norton Antivirus.

It is also a good idea to delete e-mail messages from people that you don’t know and not to open those messages.

Another good idea is to update windows on a regular basis. This can be done at the Microsoft web site.

There are several ways to clear a virus. If you have a virus scan, run a full system scan and see if that takes care of the problem.

If you do not have a virus scan, or if you do have one, but it did not clean the virus, then download and run the Stinger utility from McAfee.

If you know what the name of the virus is, you can check the Symantec website for a fix for that virus.

Also you can try an online virus scan at the Symantec site.

Spyware/Adware is software that is used to track and gather information about users and their online activities, which is then either used by or sold to advertisers. Often, a user is unaware of a spyware installation, and more often, un-installation is very difficult and may damage critical files upon removal.

There is a rising concern by Internet Privacy Watch groups as well as the Federal Government about privacy and security issues. While most spyware developers' intent is not to maliciously destroy data on a users computer, the methods used to install their software are questionable and often pose major security risks, leaving computers vulnerable to viruses and hackers. Using known exploits or by tricking the user into installing them, these programs, once installed, sometimes do nothing that is noticed by the user. Other times, they may change the homepage, modify Internet security settings and/or modify operating system files.

The most obvious way to tell a computer has spyware installed will be an excessive number of pop up ads, Internet search bars, extra icons on the desktop and/or the homepage has been changed.

Some of the less subtle ways may be a decrease in performance while surfing the Internet, or if while attempting a search on Yahoo or Google one gets redirected to another search site. These are both indicators of the presence of spyware/adware.

Check your Startup and Add/Remove Programs in the Control Panel for applications you did not install.

Contact our technical support toll-free: 877-625-9901

Contacting Support

The phone number for the Hays area is 625-9900. If you are outside the Hays area, call us toll free at 1-877-625-9901.

When you call the helpdesk, it is a good idea to know a few details. First, it helps if you know the account number or the name that your internet account is under. Second, you should know what kind of cable modem you have (Motorola, Arris, etc). Third, it is useful to know what operating system you are running (Windows XP, Windows 7, Mac OS X, etc). Having these things ready when you call will help to expedite the process of getting your problem solved.

Our Internet service will work with any Internet ready devices. Eagle does not troubleshoot computer related problems. If you are experiencing slow computer problems or issues with programs on the computer please contact the manufacture or a computer repair facility.

Our Internet service will work with any Internet ready devices. Eagle does not troubleshoot computer related problems. If you are experiencing slow computer problems or issues with programs on the computer please contact the manufacture or a computer repair facility.

Additional Support Documents

How to install a Linksys wireless router

How to Secure a Linksys wireless router

Internet Speed Test

Use to test the speed of your Internet connection.