Recovereddata froma failedhard driveUsed Linuxin aprofessionalITenvironmentConfigureda RAIDarrayAttended aLinux UsersGroup(LUG)Configureda DNSserverCompiledsoftwarefrom sourcecodeRun Linuxon aRaspberryPiExploredethicalhackingtechniquesInstalled Linuxon anunconventionaldeviceSubmitteda PR toOG LinuxKernelSet upa VPNserverSet up avirtualizationenvironmentContributed toan opensourcedocumentationprojectUsed Linuxas yourprimary OSfor over 5yearsParticipatedin ahackathonCreated acustomLinuxdistributionParticipatedin a bugbountyprogramWritten ascript toautomatea taskHosted aserver intheirhome labConfigureda firewallfromscratchBuilt a homeserver usingoldhardwareSet up asecureSSHconnectionAdministereda serverremotelyBuilt acustomLinux kernelfrom scratchMigrated aserver to anewoperatingsystemExperimentedwithcontainerizationTroubleshooteda network issueat 3 AMContributedto an open-sourceprojectAttended aLinuxconferenceoutside yourhome countryConfigureda backupsolution fortheir dataUsed Linuxin a non-traditionalcomputingenvironmentRecovereddata froma failedhard driveUsed Linuxin aprofessionalITenvironmentConfigureda RAIDarrayAttended aLinux UsersGroup(LUG)Configureda DNSserverCompiledsoftwarefrom sourcecodeRun Linuxon aRaspberryPiExploredethicalhackingtechniquesInstalled Linuxon anunconventionaldeviceSubmitteda PR toOG LinuxKernelSet upa VPNserverSet up avirtualizationenvironmentContributed toan opensourcedocumentationprojectUsed Linuxas yourprimary OSfor over 5yearsParticipatedin ahackathonCreated acustomLinuxdistributionParticipatedin a bugbountyprogramWritten ascript toautomatea taskHosted aserver intheirhome labConfigureda firewallfromscratchBuilt a homeserver usingoldhardwareSet up asecureSSHconnectionAdministereda serverremotelyBuilt acustomLinux kernelfrom scratchMigrated aserver to anewoperatingsystemExperimentedwithcontainerizationTroubleshooteda network issueat 3 AMContributedto an open-sourceprojectAttended aLinuxconferenceoutside yourhome countryConfigureda backupsolution fortheir dataUsed Linuxin a non-traditionalcomputingenvironment

Deep in the Heart - Linux Achievements - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Recovered data from a failed hard drive
  2. Used Linux in a professional IT environment
  3. Configured a RAID array
  4. Attended a Linux Users Group (LUG)
  5. Configured a DNS server
  6. Compiled software from source code
  7. Run Linux on a Raspberry Pi
  8. Explored ethical hacking techniques
  9. Installed Linux on an unconventional device
  10. Submitted a PR to OG Linux Kernel
  11. Set up a VPN server
  12. Set up a virtualization environment
  13. Contributed to an open source documentation project
  14. Used Linux as your primary OS for over 5 years
  15. Participated in a hackathon
  16. Created a custom Linux distribution
  17. Participated in a bug bounty program
  18. Written a script to automate a task
  19. Hosted a server in their home lab
  20. Configured a firewall from scratch
  21. Built a home server using old hardware
  22. Set up a secure SSH connection
  23. Administered a server remotely
  24. Built a custom Linux kernel from scratch
  25. Migrated a server to a new operating system
  26. Experimented with containerization
  27. Troubleshooted a network issue at 3 AM
  28. Contributed to an open-source project
  29. Attended a Linux conference outside your home country
  30. Configured a backup solution for their data
  31. Used Linux in a non-traditional computing environment