ExploredethicalhackingtechniquesAdministereda serverremotelyConfigureda firewallfromscratchConfigureda DNSserverSubmitteda PR toOG LinuxKernelExperimentedwithcontainerizationSet up avirtualizationenvironmentWritten ascript toautomatea taskAttended aLinux UsersGroup(LUG)Created acustomLinuxdistributionParticipatedin ahackathonConfigureda backupsolution fortheir dataContributed toan opensourcedocumentationprojectTroubleshooteda network issueat 3 AMBuilt a homeserver usingoldhardwareRecovereddata froma failedhard driveUsed Linuxin a non-traditionalcomputingenvironmentHosted aserver intheirhome labUsed Linuxas yourprimary OSfor over 5yearsBuilt acustomLinux kernelfrom scratchCompiledsoftwarefrom sourcecodeRun Linuxon aRaspberryPiContributedto an open-sourceprojectInstalled Linuxon anunconventionaldeviceUsed Linuxin aprofessionalITenvironmentConfigureda RAIDarrayParticipatedin a bugbountyprogramMigrated aserver to anewoperatingsystemSet upa VPNserverSet up asecureSSHconnectionAttended aLinuxconferenceoutside yourhome countryExploredethicalhackingtechniquesAdministereda serverremotelyConfigureda firewallfromscratchConfigureda DNSserverSubmitteda PR toOG LinuxKernelExperimentedwithcontainerizationSet up avirtualizationenvironmentWritten ascript toautomatea taskAttended aLinux UsersGroup(LUG)Created acustomLinuxdistributionParticipatedin ahackathonConfigureda backupsolution fortheir dataContributed toan opensourcedocumentationprojectTroubleshooteda network issueat 3 AMBuilt a homeserver usingoldhardwareRecovereddata froma failedhard driveUsed Linuxin a non-traditionalcomputingenvironmentHosted aserver intheirhome labUsed Linuxas yourprimary OSfor over 5yearsBuilt acustomLinux kernelfrom scratchCompiledsoftwarefrom sourcecodeRun Linuxon aRaspberryPiContributedto an open-sourceprojectInstalled Linuxon anunconventionaldeviceUsed Linuxin aprofessionalITenvironmentConfigureda RAIDarrayParticipatedin a bugbountyprogramMigrated aserver to anewoperatingsystemSet upa VPNserverSet up asecureSSHconnectionAttended aLinuxconferenceoutside yourhome country

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Explored ethical hacking techniques
  2. Administered a server remotely
  3. Configured a firewall from scratch
  4. Configured a DNS server
  5. Submitted a PR to OG Linux Kernel
  6. Experimented with containerization
  7. Set up a virtualization environment
  8. Written a script to automate a task
  9. Attended a Linux Users Group (LUG)
  10. Created a custom Linux distribution
  11. Participated in a hackathon
  12. Configured a backup solution for their data
  13. Contributed to an open source documentation project
  14. Troubleshooted a network issue at 3 AM
  15. Built a home server using old hardware
  16. Recovered data from a failed hard drive
  17. Used Linux in a non-traditional computing environment
  18. Hosted a server in their home lab
  19. Used Linux as your primary OS for over 5 years
  20. Built a custom Linux kernel from scratch
  21. Compiled software from source code
  22. Run Linux on a Raspberry Pi
  23. Contributed to an open-source project
  24. Installed Linux on an unconventional device
  25. Used Linux in a professional IT environment
  26. Configured a RAID array
  27. Participated in a bug bounty program
  28. Migrated a server to a new operating system
  29. Set up a VPN server
  30. Set up a secure SSH connection
  31. Attended a Linux conference outside your home country