Used Linuxin aprofessionalITenvironmentAttended aLinux UsersGroup(LUG)Configureda backupsolution fortheir dataSet up avirtualizationenvironmentConfigureda RAIDarrayParticipatedin a bugbountyprogramSet up asecureSSHconnectionUsed Linuxas yourprimary OSfor over 5yearsExploredethicalhackingtechniquesExperimentedwithcontainerizationMigrated aserver to anewoperatingsystemConfigureda DNSserverContributed toan opensourcedocumentationprojectUsed Linuxin a non-traditionalcomputingenvironmentTroubleshooteda network issueat 3 AMConfigureda firewallfromscratchAttended aLinuxconferenceoutside yourhome countrySubmitteda PR toOG LinuxKernelContributedto an open-sourceprojectSet upa VPNserverAdministereda serverremotelyHosted aserver intheirhome labCreated acustomLinuxdistributionParticipatedin ahackathonRun Linuxon aRaspberryPiInstalled Linuxon anunconventionaldeviceCompiledsoftwarefrom sourcecodeWritten ascript toautomatea taskRecovereddata froma failedhard driveBuilt a homeserver usingoldhardwareBuilt acustomLinux kernelfrom scratchUsed Linuxin aprofessionalITenvironmentAttended aLinux UsersGroup(LUG)Configureda backupsolution fortheir dataSet up avirtualizationenvironmentConfigureda RAIDarrayParticipatedin a bugbountyprogramSet up asecureSSHconnectionUsed Linuxas yourprimary OSfor over 5yearsExploredethicalhackingtechniquesExperimentedwithcontainerizationMigrated aserver to anewoperatingsystemConfigureda DNSserverContributed toan opensourcedocumentationprojectUsed Linuxin a non-traditionalcomputingenvironmentTroubleshooteda network issueat 3 AMConfigureda firewallfromscratchAttended aLinuxconferenceoutside yourhome countrySubmitteda PR toOG LinuxKernelContributedto an open-sourceprojectSet upa VPNserverAdministereda serverremotelyHosted aserver intheirhome labCreated acustomLinuxdistributionParticipatedin ahackathonRun Linuxon aRaspberryPiInstalled Linuxon anunconventionaldeviceCompiledsoftwarefrom sourcecodeWritten ascript toautomatea taskRecovereddata froma failedhard driveBuilt a homeserver usingoldhardwareBuilt acustomLinux kernelfrom scratch

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Used Linux in a professional IT environment
  2. Attended a Linux Users Group (LUG)
  3. Configured a backup solution for their data
  4. Set up a virtualization environment
  5. Configured a RAID array
  6. Participated in a bug bounty program
  7. Set up a secure SSH connection
  8. Used Linux as your primary OS for over 5 years
  9. Explored ethical hacking techniques
  10. Experimented with containerization
  11. Migrated a server to a new operating system
  12. Configured a DNS server
  13. Contributed to an open source documentation project
  14. Used Linux in a non-traditional computing environment
  15. Troubleshooted a network issue at 3 AM
  16. Configured a firewall from scratch
  17. Attended a Linux conference outside your home country
  18. Submitted a PR to OG Linux Kernel
  19. Contributed to an open-source project
  20. Set up a VPN server
  21. Administered a server remotely
  22. Hosted a server in their home lab
  23. Created a custom Linux distribution
  24. Participated in a hackathon
  25. Run Linux on a Raspberry Pi
  26. Installed Linux on an unconventional device
  27. Compiled software from source code
  28. Written a script to automate a task
  29. Recovered data from a failed hard drive
  30. Built a home server using old hardware
  31. Built a custom Linux kernel from scratch