Written ascript toautomatea taskInstalled Linuxon anunconventionaldeviceTroubleshooteda network issueat 3 AMContributed toan opensourcedocumentationprojectSet up avirtualizationenvironmentSet upa VPNserverCreated acustomLinuxdistributionConfigureda firewallfromscratchUsed Linuxin a non-traditionalcomputingenvironmentParticipatedin a bugbountyprogramParticipatedin ahackathonBuilt acustomLinux kernelfrom scratchSubmitteda PR toOG LinuxKernelExperimentedwithcontainerizationUsed Linuxin aprofessionalITenvironmentAttended aLinuxconferenceoutside yourhome countryRecovereddata froma failedhard driveExploredethicalhackingtechniquesConfigureda DNSserverMigrated aserver to anewoperatingsystemUsed Linuxas yourprimary OSfor over 5yearsContributedto an open-sourceprojectAttended aLinux UsersGroup(LUG)Run Linuxon aRaspberryPiBuilt a homeserver usingoldhardwareSet up asecureSSHconnectionCompiledsoftwarefrom sourcecodeHosted aserver intheirhome labConfigureda RAIDarrayAdministereda serverremotelyConfigureda backupsolution fortheir dataWritten ascript toautomatea taskInstalled Linuxon anunconventionaldeviceTroubleshooteda network issueat 3 AMContributed toan opensourcedocumentationprojectSet up avirtualizationenvironmentSet upa VPNserverCreated acustomLinuxdistributionConfigureda firewallfromscratchUsed Linuxin a non-traditionalcomputingenvironmentParticipatedin a bugbountyprogramParticipatedin ahackathonBuilt acustomLinux kernelfrom scratchSubmitteda PR toOG LinuxKernelExperimentedwithcontainerizationUsed Linuxin aprofessionalITenvironmentAttended aLinuxconferenceoutside yourhome countryRecovereddata froma failedhard driveExploredethicalhackingtechniquesConfigureda DNSserverMigrated aserver to anewoperatingsystemUsed Linuxas yourprimary OSfor over 5yearsContributedto an open-sourceprojectAttended aLinux UsersGroup(LUG)Run Linuxon aRaspberryPiBuilt a homeserver usingoldhardwareSet up asecureSSHconnectionCompiledsoftwarefrom sourcecodeHosted aserver intheirhome labConfigureda RAIDarrayAdministereda serverremotelyConfigureda backupsolution fortheir data

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Written a script to automate a task
  2. Installed Linux on an unconventional device
  3. Troubleshooted a network issue at 3 AM
  4. Contributed to an open source documentation project
  5. Set up a virtualization environment
  6. Set up a VPN server
  7. Created a custom Linux distribution
  8. Configured a firewall from scratch
  9. Used Linux in a non-traditional computing environment
  10. Participated in a bug bounty program
  11. Participated in a hackathon
  12. Built a custom Linux kernel from scratch
  13. Submitted a PR to OG Linux Kernel
  14. Experimented with containerization
  15. Used Linux in a professional IT environment
  16. Attended a Linux conference outside your home country
  17. Recovered data from a failed hard drive
  18. Explored ethical hacking techniques
  19. Configured a DNS server
  20. Migrated a server to a new operating system
  21. Used Linux as your primary OS for over 5 years
  22. Contributed to an open-source project
  23. Attended a Linux Users Group (LUG)
  24. Run Linux on a Raspberry Pi
  25. Built a home server using old hardware
  26. Set up a secure SSH connection
  27. Compiled software from source code
  28. Hosted a server in their home lab
  29. Configured a RAID array
  30. Administered a server remotely
  31. Configured a backup solution for their data