Attended aLinux UsersGroup(LUG)Configureda firewallfromscratchWritten ascript toautomatea taskRun Linuxon aRaspberryPiSet up asecureSSHconnectionInstalled Linuxon anunconventionaldeviceMigrated aserver to anewoperatingsystemSet upa VPNserverConfigureda backupsolution fortheir dataRecovereddata froma failedhard driveAttended aLinuxconferenceoutside yourhome countryParticipatedin ahackathonCompiledsoftwarefrom sourcecodeSet up avirtualizationenvironmentTroubleshooteda network issueat 3 AMExperimentedwithcontainerizationUsed Linuxin aprofessionalITenvironmentAdministereda serverremotelyParticipatedin a bugbountyprogramHosted aserver intheirhome labConfigureda RAIDarrayBuilt a homeserver usingoldhardwareBuilt acustomLinux kernelfrom scratchContributedto an open-sourceprojectUsed Linuxin a non-traditionalcomputingenvironmentConfigureda DNSserverCreated acustomLinuxdistributionSubmitteda PR toOG LinuxKernelExploredethicalhackingtechniquesUsed Linuxas yourprimary OSfor over 5yearsContributed toan opensourcedocumentationprojectAttended aLinux UsersGroup(LUG)Configureda firewallfromscratchWritten ascript toautomatea taskRun Linuxon aRaspberryPiSet up asecureSSHconnectionInstalled Linuxon anunconventionaldeviceMigrated aserver to anewoperatingsystemSet upa VPNserverConfigureda backupsolution fortheir dataRecovereddata froma failedhard driveAttended aLinuxconferenceoutside yourhome countryParticipatedin ahackathonCompiledsoftwarefrom sourcecodeSet up avirtualizationenvironmentTroubleshooteda network issueat 3 AMExperimentedwithcontainerizationUsed Linuxin aprofessionalITenvironmentAdministereda serverremotelyParticipatedin a bugbountyprogramHosted aserver intheirhome labConfigureda RAIDarrayBuilt a homeserver usingoldhardwareBuilt acustomLinux kernelfrom scratchContributedto an open-sourceprojectUsed Linuxin a non-traditionalcomputingenvironmentConfigureda DNSserverCreated acustomLinuxdistributionSubmitteda PR toOG LinuxKernelExploredethicalhackingtechniquesUsed Linuxas yourprimary OSfor over 5yearsContributed toan opensourcedocumentationproject

Deep in the Heart - Linux Achievements - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Attended a Linux Users Group (LUG)
  2. Configured a firewall from scratch
  3. Written a script to automate a task
  4. Run Linux on a Raspberry Pi
  5. Set up a secure SSH connection
  6. Installed Linux on an unconventional device
  7. Migrated a server to a new operating system
  8. Set up a VPN server
  9. Configured a backup solution for their data
  10. Recovered data from a failed hard drive
  11. Attended a Linux conference outside your home country
  12. Participated in a hackathon
  13. Compiled software from source code
  14. Set up a virtualization environment
  15. Troubleshooted a network issue at 3 AM
  16. Experimented with containerization
  17. Used Linux in a professional IT environment
  18. Administered a server remotely
  19. Participated in a bug bounty program
  20. Hosted a server in their home lab
  21. Configured a RAID array
  22. Built a home server using old hardware
  23. Built a custom Linux kernel from scratch
  24. Contributed to an open-source project
  25. Used Linux in a non-traditional computing environment
  26. Configured a DNS server
  27. Created a custom Linux distribution
  28. Submitted a PR to OG Linux Kernel
  29. Explored ethical hacking techniques
  30. Used Linux as your primary OS for over 5 years
  31. Contributed to an open source documentation project