Used Linuxin a non-traditionalcomputingenvironmentWritten ascript toautomatea taskParticipatedin a bugbountyprogramExploredethicalhackingtechniquesSet up avirtualizationenvironmentContributedto an open-sourceprojectTroubleshooteda network issueat 3 AMUsed Linuxas yourprimary OSfor over 5yearsCreated acustomLinuxdistributionSet up asecureSSHconnectionRecovereddata froma failedhard driveAttended aLinux UsersGroup(LUG)Compiledsoftwarefrom sourcecodeBuilt a homeserver usingoldhardwareSubmitteda PR toOG LinuxKernelUsed Linuxin aprofessionalITenvironmentInstalled Linuxon anunconventionaldeviceAdministereda serverremotelyConfigureda firewallfromscratchSet upa VPNserverConfigureda RAIDarrayConfigureda backupsolution fortheir dataContributed toan opensourcedocumentationprojectRun Linuxon aRaspberryPiHosted aserver intheirhome labAttended aLinuxconferenceoutside yourhome countryBuilt acustomLinux kernelfrom scratchExperimentedwithcontainerizationConfigureda DNSserverMigrated aserver to anewoperatingsystemParticipatedin ahackathonUsed Linuxin a non-traditionalcomputingenvironmentWritten ascript toautomatea taskParticipatedin a bugbountyprogramExploredethicalhackingtechniquesSet up avirtualizationenvironmentContributedto an open-sourceprojectTroubleshooteda network issueat 3 AMUsed Linuxas yourprimary OSfor over 5yearsCreated acustomLinuxdistributionSet up asecureSSHconnectionRecovereddata froma failedhard driveAttended aLinux UsersGroup(LUG)Compiledsoftwarefrom sourcecodeBuilt a homeserver usingoldhardwareSubmitteda PR toOG LinuxKernelUsed Linuxin aprofessionalITenvironmentInstalled Linuxon anunconventionaldeviceAdministereda serverremotelyConfigureda firewallfromscratchSet upa VPNserverConfigureda RAIDarrayConfigureda backupsolution fortheir dataContributed toan opensourcedocumentationprojectRun Linuxon aRaspberryPiHosted aserver intheirhome labAttended aLinuxconferenceoutside yourhome countryBuilt acustomLinux kernelfrom scratchExperimentedwithcontainerizationConfigureda DNSserverMigrated aserver to anewoperatingsystemParticipatedin ahackathon

Deep in the Heart - Linux Achievements - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Used Linux in a non-traditional computing environment
  2. Written a script to automate a task
  3. Participated in a bug bounty program
  4. Explored ethical hacking techniques
  5. Set up a virtualization environment
  6. Contributed to an open-source project
  7. Troubleshooted a network issue at 3 AM
  8. Used Linux as your primary OS for over 5 years
  9. Created a custom Linux distribution
  10. Set up a secure SSH connection
  11. Recovered data from a failed hard drive
  12. Attended a Linux Users Group (LUG)
  13. Compiled software from source code
  14. Built a home server using old hardware
  15. Submitted a PR to OG Linux Kernel
  16. Used Linux in a professional IT environment
  17. Installed Linux on an unconventional device
  18. Administered a server remotely
  19. Configured a firewall from scratch
  20. Set up a VPN server
  21. Configured a RAID array
  22. Configured a backup solution for their data
  23. Contributed to an open source documentation project
  24. Run Linux on a Raspberry Pi
  25. Hosted a server in their home lab
  26. Attended a Linux conference outside your home country
  27. Built a custom Linux kernel from scratch
  28. Experimented with containerization
  29. Configured a DNS server
  30. Migrated a server to a new operating system
  31. Participated in a hackathon