Set up asecureSSHconnectionRun Linuxon aRaspberryPiConfigureda backupsolution fortheir dataSet upa VPNserverExperimentedwithcontainerizationContributedto an open-sourceprojectRecovereddata froma failedhard driveCreated acustomLinuxdistributionSet up avirtualizationenvironmentConfigureda firewallfromscratchUsed Linuxin a non-traditionalcomputingenvironmentAdministereda serverremotelyCompiledsoftwarefrom sourcecodeBuilt a homeserver usingoldhardwareUsed Linuxas yourprimary OSfor over 5yearsParticipatedin ahackathonContributed toan opensourcedocumentationprojectParticipatedin a bugbountyprogramTroubleshooteda network issueat 3 AMUsed Linuxin aprofessionalITenvironmentExploredethicalhackingtechniquesConfigureda RAIDarrayAttended aLinuxconferenceoutside yourhome countryAttended aLinux UsersGroup(LUG)Migrated aserver to anewoperatingsystemSubmitteda PR toOG LinuxKernelWritten ascript toautomatea taskHosted aserver intheirhome labConfigureda DNSserverBuilt acustomLinux kernelfrom scratchInstalled Linuxon anunconventionaldeviceSet up asecureSSHconnectionRun Linuxon aRaspberryPiConfigureda backupsolution fortheir dataSet upa VPNserverExperimentedwithcontainerizationContributedto an open-sourceprojectRecovereddata froma failedhard driveCreated acustomLinuxdistributionSet up avirtualizationenvironmentConfigureda firewallfromscratchUsed Linuxin a non-traditionalcomputingenvironmentAdministereda serverremotelyCompiledsoftwarefrom sourcecodeBuilt a homeserver usingoldhardwareUsed Linuxas yourprimary OSfor over 5yearsParticipatedin ahackathonContributed toan opensourcedocumentationprojectParticipatedin a bugbountyprogramTroubleshooteda network issueat 3 AMUsed Linuxin aprofessionalITenvironmentExploredethicalhackingtechniquesConfigureda RAIDarrayAttended aLinuxconferenceoutside yourhome countryAttended aLinux UsersGroup(LUG)Migrated aserver to anewoperatingsystemSubmitteda PR toOG LinuxKernelWritten ascript toautomatea taskHosted aserver intheirhome labConfigureda DNSserverBuilt acustomLinux kernelfrom scratchInstalled Linuxon anunconventionaldevice

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Set up a secure SSH connection
  2. Run Linux on a Raspberry Pi
  3. Configured a backup solution for their data
  4. Set up a VPN server
  5. Experimented with containerization
  6. Contributed to an open-source project
  7. Recovered data from a failed hard drive
  8. Created a custom Linux distribution
  9. Set up a virtualization environment
  10. Configured a firewall from scratch
  11. Used Linux in a non-traditional computing environment
  12. Administered a server remotely
  13. Compiled software from source code
  14. Built a home server using old hardware
  15. Used Linux as your primary OS for over 5 years
  16. Participated in a hackathon
  17. Contributed to an open source documentation project
  18. Participated in a bug bounty program
  19. Troubleshooted a network issue at 3 AM
  20. Used Linux in a professional IT environment
  21. Explored ethical hacking techniques
  22. Configured a RAID array
  23. Attended a Linux conference outside your home country
  24. Attended a Linux Users Group (LUG)
  25. Migrated a server to a new operating system
  26. Submitted a PR to OG Linux Kernel
  27. Written a script to automate a task
  28. Hosted a server in their home lab
  29. Configured a DNS server
  30. Built a custom Linux kernel from scratch
  31. Installed Linux on an unconventional device