Installed Linuxon anunconventionaldeviceContributed toan opensourcedocumentationprojectExperimentedwithcontainerizationConfigureda RAIDarrayWritten ascript toautomatea taskRun Linuxon aRaspberryPiAttended aLinuxconferenceoutside yourhome countryBuilt a homeserver usingoldhardwareSubmitteda PR toOG LinuxKernelCompiledsoftwarefrom sourcecodeUsed Linuxin aprofessionalITenvironmentConfigureda backupsolution fortheir dataUsed Linuxin a non-traditionalcomputingenvironmentHosted aserver intheirhome labUsed Linuxas yourprimary OSfor over 5yearsCreated acustomLinuxdistributionBuilt acustomLinux kernelfrom scratchContributedto an open-sourceprojectSet upa VPNserverConfigureda firewallfromscratchTroubleshooteda network issueat 3 AMExploredethicalhackingtechniquesAdministereda serverremotelySet up avirtualizationenvironmentParticipatedin ahackathonParticipatedin a bugbountyprogramRecovereddata froma failedhard driveAttended aLinux UsersGroup(LUG)Configureda DNSserverSet up asecureSSHconnectionMigrated aserver to anewoperatingsystemInstalled Linuxon anunconventionaldeviceContributed toan opensourcedocumentationprojectExperimentedwithcontainerizationConfigureda RAIDarrayWritten ascript toautomatea taskRun Linuxon aRaspberryPiAttended aLinuxconferenceoutside yourhome countryBuilt a homeserver usingoldhardwareSubmitteda PR toOG LinuxKernelCompiledsoftwarefrom sourcecodeUsed Linuxin aprofessionalITenvironmentConfigureda backupsolution fortheir dataUsed Linuxin a non-traditionalcomputingenvironmentHosted aserver intheirhome labUsed Linuxas yourprimary OSfor over 5yearsCreated acustomLinuxdistributionBuilt acustomLinux kernelfrom scratchContributedto an open-sourceprojectSet upa VPNserverConfigureda firewallfromscratchTroubleshooteda network issueat 3 AMExploredethicalhackingtechniquesAdministereda serverremotelySet up avirtualizationenvironmentParticipatedin ahackathonParticipatedin a bugbountyprogramRecovereddata froma failedhard driveAttended aLinux UsersGroup(LUG)Configureda DNSserverSet up asecureSSHconnectionMigrated aserver to anewoperatingsystem

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Installed Linux on an unconventional device
  2. Contributed to an open source documentation project
  3. Experimented with containerization
  4. Configured a RAID array
  5. Written a script to automate a task
  6. Run Linux on a Raspberry Pi
  7. Attended a Linux conference outside your home country
  8. Built a home server using old hardware
  9. Submitted a PR to OG Linux Kernel
  10. Compiled software from source code
  11. Used Linux in a professional IT environment
  12. Configured a backup solution for their data
  13. Used Linux in a non-traditional computing environment
  14. Hosted a server in their home lab
  15. Used Linux as your primary OS for over 5 years
  16. Created a custom Linux distribution
  17. Built a custom Linux kernel from scratch
  18. Contributed to an open-source project
  19. Set up a VPN server
  20. Configured a firewall from scratch
  21. Troubleshooted a network issue at 3 AM
  22. Explored ethical hacking techniques
  23. Administered a server remotely
  24. Set up a virtualization environment
  25. Participated in a hackathon
  26. Participated in a bug bounty program
  27. Recovered data from a failed hard drive
  28. Attended a Linux Users Group (LUG)
  29. Configured a DNS server
  30. Set up a secure SSH connection
  31. Migrated a server to a new operating system