Configureda RAIDarrayBuilt acustomLinux kernelfrom scratchRecovereddata froma failedhard driveParticipatedin ahackathonConfigureda firewallfromscratchAdministereda serverremotelySet up avirtualizationenvironmentUsed Linuxin a non-traditionalcomputingenvironmentRun Linuxon aRaspberryPiInstalled Linuxon anunconventionaldeviceHosted aserver intheirhome labSet up asecureSSHconnectionBuilt a homeserver usingoldhardwareConfigureda DNSserverSet upa VPNserverConfigureda backupsolution fortheir dataAttended aLinux UsersGroup(LUG)Compiledsoftwarefrom sourcecodeParticipatedin a bugbountyprogramContributedto an open-sourceprojectTroubleshooteda network issueat 3 AMSubmitteda PR toOG LinuxKernelWritten ascript toautomatea taskExperimentedwithcontainerizationContributed toan opensourcedocumentationprojectUsed Linuxas yourprimary OSfor over 5yearsCreated acustomLinuxdistributionUsed Linuxin aprofessionalITenvironmentAttended aLinuxconferenceoutside yourhome countryMigrated aserver to anewoperatingsystemExploredethicalhackingtechniquesConfigureda RAIDarrayBuilt acustomLinux kernelfrom scratchRecovereddata froma failedhard driveParticipatedin ahackathonConfigureda firewallfromscratchAdministereda serverremotelySet up avirtualizationenvironmentUsed Linuxin a non-traditionalcomputingenvironmentRun Linuxon aRaspberryPiInstalled Linuxon anunconventionaldeviceHosted aserver intheirhome labSet up asecureSSHconnectionBuilt a homeserver usingoldhardwareConfigureda DNSserverSet upa VPNserverConfigureda backupsolution fortheir dataAttended aLinux UsersGroup(LUG)Compiledsoftwarefrom sourcecodeParticipatedin a bugbountyprogramContributedto an open-sourceprojectTroubleshooteda network issueat 3 AMSubmitteda PR toOG LinuxKernelWritten ascript toautomatea taskExperimentedwithcontainerizationContributed toan opensourcedocumentationprojectUsed Linuxas yourprimary OSfor over 5yearsCreated acustomLinuxdistributionUsed Linuxin aprofessionalITenvironmentAttended aLinuxconferenceoutside yourhome countryMigrated aserver to anewoperatingsystemExploredethicalhackingtechniques

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Configured a RAID array
  2. Built a custom Linux kernel from scratch
  3. Recovered data from a failed hard drive
  4. Participated in a hackathon
  5. Configured a firewall from scratch
  6. Administered a server remotely
  7. Set up a virtualization environment
  8. Used Linux in a non-traditional computing environment
  9. Run Linux on a Raspberry Pi
  10. Installed Linux on an unconventional device
  11. Hosted a server in their home lab
  12. Set up a secure SSH connection
  13. Built a home server using old hardware
  14. Configured a DNS server
  15. Set up a VPN server
  16. Configured a backup solution for their data
  17. Attended a Linux Users Group (LUG)
  18. Compiled software from source code
  19. Participated in a bug bounty program
  20. Contributed to an open-source project
  21. Troubleshooted a network issue at 3 AM
  22. Submitted a PR to OG Linux Kernel
  23. Written a script to automate a task
  24. Experimented with containerization
  25. Contributed to an open source documentation project
  26. Used Linux as your primary OS for over 5 years
  27. Created a custom Linux distribution
  28. Used Linux in a professional IT environment
  29. Attended a Linux conference outside your home country
  30. Migrated a server to a new operating system
  31. Explored ethical hacking techniques