Configureda backupsolution fortheir dataSet up avirtualizationenvironmentSet upa VPNserverContributedto an open-sourceprojectParticipatedin a bugbountyprogramAttended aLinux UsersGroup(LUG)Used Linuxas yourprimary OSfor over 5yearsExploredethicalhackingtechniquesHosted aserver intheirhome labUsed Linuxin aprofessionalITenvironmentBuilt acustomLinux kernelfrom scratchAdministereda serverremotelyConfigureda firewallfromscratchContributed toan opensourcedocumentationprojectInstalled Linuxon anunconventionaldeviceRecovereddata froma failedhard driveConfigureda RAIDarrayExperimentedwithcontainerizationCreated acustomLinuxdistributionMigrated aserver to anewoperatingsystemAttended aLinuxconferenceoutside yourhome countryCompiledsoftwarefrom sourcecodeSubmitteda PR toOG LinuxKernelRun Linuxon aRaspberryPiBuilt a homeserver usingoldhardwareConfigureda DNSserverParticipatedin ahackathonSet up asecureSSHconnectionWritten ascript toautomatea taskUsed Linuxin a non-traditionalcomputingenvironmentTroubleshooteda network issueat 3 AMConfigureda backupsolution fortheir dataSet up avirtualizationenvironmentSet upa VPNserverContributedto an open-sourceprojectParticipatedin a bugbountyprogramAttended aLinux UsersGroup(LUG)Used Linuxas yourprimary OSfor over 5yearsExploredethicalhackingtechniquesHosted aserver intheirhome labUsed Linuxin aprofessionalITenvironmentBuilt acustomLinux kernelfrom scratchAdministereda serverremotelyConfigureda firewallfromscratchContributed toan opensourcedocumentationprojectInstalled Linuxon anunconventionaldeviceRecovereddata froma failedhard driveConfigureda RAIDarrayExperimentedwithcontainerizationCreated acustomLinuxdistributionMigrated aserver to anewoperatingsystemAttended aLinuxconferenceoutside yourhome countryCompiledsoftwarefrom sourcecodeSubmitteda PR toOG LinuxKernelRun Linuxon aRaspberryPiBuilt a homeserver usingoldhardwareConfigureda DNSserverParticipatedin ahackathonSet up asecureSSHconnectionWritten ascript toautomatea taskUsed Linuxin a non-traditionalcomputingenvironmentTroubleshooteda network issueat 3 AM

Deep in the Heart of Rocky - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
  1. Configured a backup solution for their data
  2. Set up a virtualization environment
  3. Set up a VPN server
  4. Contributed to an open-source project
  5. Participated in a bug bounty program
  6. Attended a Linux Users Group (LUG)
  7. Used Linux as your primary OS for over 5 years
  8. Explored ethical hacking techniques
  9. Hosted a server in their home lab
  10. Used Linux in a professional IT environment
  11. Built a custom Linux kernel from scratch
  12. Administered a server remotely
  13. Configured a firewall from scratch
  14. Contributed to an open source documentation project
  15. Installed Linux on an unconventional device
  16. Recovered data from a failed hard drive
  17. Configured a RAID array
  18. Experimented with containerization
  19. Created a custom Linux distribution
  20. Migrated a server to a new operating system
  21. Attended a Linux conference outside your home country
  22. Compiled software from source code
  23. Submitted a PR to OG Linux Kernel
  24. Run Linux on a Raspberry Pi
  25. Built a home server using old hardware
  26. Configured a DNS server
  27. Participated in a hackathon
  28. Set up a secure SSH connection
  29. Written a script to automate a task
  30. Used Linux in a non-traditional computing environment
  31. Troubleshooted a network issue at 3 AM