Attended aLinux UsersGroup(LUG)Compiledsoftwarefrom sourcecodeTroubleshooteda network issueat 3 AMRun Linuxon aRaspberryPiConfigureda backupsolution fortheir dataContributedto an open-sourceprojectSet up avirtualizationenvironmentUsed Linuxas yourprimary OSfor over 5yearsSet upa VPNserverHosted aserver intheirhome labUsed Linuxin aprofessionalITenvironmentSubmitteda PR toOG LinuxKernelExploredethicalhackingtechniquesAttended aLinuxconferenceoutside yourhome countrySet up asecureSSHconnectionMigrated aserver to anewoperatingsystemBuilt a homeserver usingoldhardwareContributed toan opensourcedocumentationprojectBuilt acustomLinux kernelfrom scratchConfigureda DNSserverExperimentedwithcontainerizationWritten ascript toautomatea taskUsed Linuxin a non-traditionalcomputingenvironmentRecovereddata froma failedhard driveCreated acustomLinuxdistributionConfigureda RAIDarrayAdministereda serverremotelyParticipatedin a bugbountyprogramConfigureda firewallfromscratchInstalled Linuxon anunconventionaldeviceParticipatedin ahackathonAttended aLinux UsersGroup(LUG)Compiledsoftwarefrom sourcecodeTroubleshooteda network issueat 3 AMRun Linuxon aRaspberryPiConfigureda backupsolution fortheir dataContributedto an open-sourceprojectSet up avirtualizationenvironmentUsed Linuxas yourprimary OSfor over 5yearsSet upa VPNserverHosted aserver intheirhome labUsed Linuxin aprofessionalITenvironmentSubmitteda PR toOG LinuxKernelExploredethicalhackingtechniquesAttended aLinuxconferenceoutside yourhome countrySet up asecureSSHconnectionMigrated aserver to anewoperatingsystemBuilt a homeserver usingoldhardwareContributed toan opensourcedocumentationprojectBuilt acustomLinux kernelfrom scratchConfigureda DNSserverExperimentedwithcontainerizationWritten ascript toautomatea taskUsed Linuxin a non-traditionalcomputingenvironmentRecovereddata froma failedhard driveCreated acustomLinuxdistributionConfigureda RAIDarrayAdministereda serverremotelyParticipatedin a bugbountyprogramConfigureda firewallfromscratchInstalled Linuxon anunconventionaldeviceParticipatedin ahackathon

Deep in the Heart - Linux Achievements - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Attended a Linux Users Group (LUG)
  2. Compiled software from source code
  3. Troubleshooted a network issue at 3 AM
  4. Run Linux on a Raspberry Pi
  5. Configured a backup solution for their data
  6. Contributed to an open-source project
  7. Set up a virtualization environment
  8. Used Linux as your primary OS for over 5 years
  9. Set up a VPN server
  10. Hosted a server in their home lab
  11. Used Linux in a professional IT environment
  12. Submitted a PR to OG Linux Kernel
  13. Explored ethical hacking techniques
  14. Attended a Linux conference outside your home country
  15. Set up a secure SSH connection
  16. Migrated a server to a new operating system
  17. Built a home server using old hardware
  18. Contributed to an open source documentation project
  19. Built a custom Linux kernel from scratch
  20. Configured a DNS server
  21. Experimented with containerization
  22. Written a script to automate a task
  23. Used Linux in a non-traditional computing environment
  24. Recovered data from a failed hard drive
  25. Created a custom Linux distribution
  26. Configured a RAID array
  27. Administered a server remotely
  28. Participated in a bug bounty program
  29. Configured a firewall from scratch
  30. Installed Linux on an unconventional device
  31. Participated in a hackathon