Oh, don't get me started. That is one of my favorite subjects to rant
about, typically right after it happens.
I'm not aware of such a volume, but telnet is pretty straightforward.
Anyone operating providing access to a service over telnet will (or
"should") outline the rules and requirements you need to keep in mind.
Your telnet program may be able to try and determine what type of
terminal it should emulate. If you have to specify it manually, the
service operator should be able to tell you what you need to select,
or you can just try various terminal types until you get one that
works. The nice thing about picking terminal types is that if you get
it wrong, there won't be any lasting harm done. The screen will just
look wrong and keystrokes may not work as you expect them to.
Since you're doing this on the N40, I'd look at the man page for
telnet to see what your options are, and what the program's
Remember: Telnet is *not* a secure protocol by itself. Everything that
goes out over a telnet session goes in clear text that anyone could
read. If you connect to a service that uses a password, it should be