Configureda DNSserverInstalled Linuxon anunconventionaldeviceSubmitteda PR toOG LinuxKernelRun Linuxon aRaspberryPiContributed toan opensourcedocumentationprojectAttended aLinuxconferenceoutside yourhome countryExperimentedwithcontainerizationMigrated aserver to anewoperatingsystemParticipatedin ahackathonCompiledsoftwarefrom sourcecodeUsed Linuxin aprofessionalITenvironmentWritten ascript toautomatea taskHosted aserver intheirhome labSet upa VPNserverBuilt acustomLinux kernelfrom scratchRecovereddata froma failedhard driveConfigureda backupsolution fortheir dataExploredethicalhackingtechniquesCreated acustomLinuxdistributionContributedto an open-sourceprojectSet up avirtualizationenvironmentTroubleshooteda network issueat 3 AMSet up asecureSSHconnectionAdministereda serverremotelyUsed Linuxas yourprimary OSfor over 5yearsConfigureda firewallfromscratchUsed Linuxin a non-traditionalcomputingenvironmentAttended aLinux UsersGroup(LUG)Configureda RAIDarrayParticipatedin a bugbountyprogramBuilt a homeserver usingoldhardwareConfigureda DNSserverInstalled Linuxon anunconventionaldeviceSubmitteda PR toOG LinuxKernelRun Linuxon aRaspberryPiContributed toan opensourcedocumentationprojectAttended aLinuxconferenceoutside yourhome countryExperimentedwithcontainerizationMigrated aserver to anewoperatingsystemParticipatedin ahackathonCompiledsoftwarefrom sourcecodeUsed Linuxin aprofessionalITenvironmentWritten ascript toautomatea taskHosted aserver intheirhome labSet upa VPNserverBuilt acustomLinux kernelfrom scratchRecovereddata froma failedhard driveConfigureda backupsolution fortheir dataExploredethicalhackingtechniquesCreated acustomLinuxdistributionContributedto an open-sourceprojectSet up avirtualizationenvironmentTroubleshooteda network issueat 3 AMSet up asecureSSHconnectionAdministereda serverremotelyUsed Linuxas yourprimary OSfor over 5yearsConfigureda firewallfromscratchUsed Linuxin a non-traditionalcomputingenvironmentAttended aLinux UsersGroup(LUG)Configureda RAIDarrayParticipatedin a bugbountyprogramBuilt a homeserver usingoldhardware

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Configured a DNS server
  2. Installed Linux on an unconventional device
  3. Submitted a PR to OG Linux Kernel
  4. Run Linux on a Raspberry Pi
  5. Contributed to an open source documentation project
  6. Attended a Linux conference outside your home country
  7. Experimented with containerization
  8. Migrated a server to a new operating system
  9. Participated in a hackathon
  10. Compiled software from source code
  11. Used Linux in a professional IT environment
  12. Written a script to automate a task
  13. Hosted a server in their home lab
  14. Set up a VPN server
  15. Built a custom Linux kernel from scratch
  16. Recovered data from a failed hard drive
  17. Configured a backup solution for their data
  18. Explored ethical hacking techniques
  19. Created a custom Linux distribution
  20. Contributed to an open-source project
  21. Set up a virtualization environment
  22. Troubleshooted a network issue at 3 AM
  23. Set up a secure SSH connection
  24. Administered a server remotely
  25. Used Linux as your primary OS for over 5 years
  26. Configured a firewall from scratch
  27. Used Linux in a non-traditional computing environment
  28. Attended a Linux Users Group (LUG)
  29. Configured a RAID array
  30. Participated in a bug bounty program
  31. Built a home server using old hardware