Attended aLinux UsersGroup(LUG)Participatedin a bugbountyprogramBuilt a homeserver usingoldhardwareInstalled Linuxon anunconventionaldeviceSubmitteda PR toOG LinuxKernelBuilt acustomLinux kernelfrom scratchAdministereda serverremotelyUsed Linuxas yourprimary OSfor over 5yearsRun Linuxon aRaspberryPiSet upa VPNserverConfigureda RAIDarrayConfigureda firewallfromscratchHosted aserver intheirhome labMigrated aserver to anewoperatingsystemExperimentedwithcontainerizationSet up avirtualizationenvironmentParticipatedin ahackathonRecovereddata froma failedhard driveWritten ascript toautomatea taskExploredethicalhackingtechniquesContributedto an open-sourceprojectCreated acustomLinuxdistributionUsed Linuxin aprofessionalITenvironmentContributed toan opensourcedocumentationprojectAttended aLinuxconferenceoutside yourhome countryUsed Linuxin a non-traditionalcomputingenvironmentTroubleshooteda network issueat 3 AMCompiledsoftwarefrom sourcecodeConfigureda backupsolution fortheir dataSet up asecureSSHconnectionConfigureda DNSserverAttended aLinux UsersGroup(LUG)Participatedin a bugbountyprogramBuilt a homeserver usingoldhardwareInstalled Linuxon anunconventionaldeviceSubmitteda PR toOG LinuxKernelBuilt acustomLinux kernelfrom scratchAdministereda serverremotelyUsed Linuxas yourprimary OSfor over 5yearsRun Linuxon aRaspberryPiSet upa VPNserverConfigureda RAIDarrayConfigureda firewallfromscratchHosted aserver intheirhome labMigrated aserver to anewoperatingsystemExperimentedwithcontainerizationSet up avirtualizationenvironmentParticipatedin ahackathonRecovereddata froma failedhard driveWritten ascript toautomatea taskExploredethicalhackingtechniquesContributedto an open-sourceprojectCreated acustomLinuxdistributionUsed Linuxin aprofessionalITenvironmentContributed toan opensourcedocumentationprojectAttended aLinuxconferenceoutside yourhome countryUsed Linuxin a non-traditionalcomputingenvironmentTroubleshooteda network issueat 3 AMCompiledsoftwarefrom sourcecodeConfigureda backupsolution fortheir dataSet up asecureSSHconnectionConfigureda DNSserver

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Attended a Linux Users Group (LUG)
  2. Participated in a bug bounty program
  3. Built a home server using old hardware
  4. Installed Linux on an unconventional device
  5. Submitted a PR to OG Linux Kernel
  6. Built a custom Linux kernel from scratch
  7. Administered a server remotely
  8. Used Linux as your primary OS for over 5 years
  9. Run Linux on a Raspberry Pi
  10. Set up a VPN server
  11. Configured a RAID array
  12. Configured a firewall from scratch
  13. Hosted a server in their home lab
  14. Migrated a server to a new operating system
  15. Experimented with containerization
  16. Set up a virtualization environment
  17. Participated in a hackathon
  18. Recovered data from a failed hard drive
  19. Written a script to automate a task
  20. Explored ethical hacking techniques
  21. Contributed to an open-source project
  22. Created a custom Linux distribution
  23. Used Linux in a professional IT environment
  24. Contributed to an open source documentation project
  25. Attended a Linux conference outside your home country
  26. Used Linux in a non-traditional computing environment
  27. Troubleshooted a network issue at 3 AM
  28. Compiled software from source code
  29. Configured a backup solution for their data
  30. Set up a secure SSH connection
  31. Configured a DNS server