Clickjacking Hack Cookies Hacker Spacefiller Virus Overwrite Virus Resident Virus Keylogger Hack SQL Injections Theft of Cookies Distribute Denial of Services Multipartite Virus Boot Sector Virus Fake Wireless Access Points (W.A.P) Polymorphic Virus Denial of Services Browser Hijacker Trojan Virus Watering Hole Attacks Phishing Spacefiller Virus Web Scripting Virus Bait and Switch Hack Macro Virus Hacker Trojan Horses Clickjacking Hack Cookies Hacker Spacefiller Virus Overwrite Virus Resident Virus Keylogger Hack SQL Injections Theft of Cookies Distribute Denial of Services Multipartite Virus Boot Sector Virus Fake Wireless Access Points (W.A.P) Polymorphic Virus Denial of Services Browser Hijacker Trojan Virus Watering Hole Attacks Phishing Spacefiller Virus Web Scripting Virus Bait and Switch Hack Macro Virus Hacker Trojan Horses
(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
I-Clickjacking Hack
N-Cookies Hacker Spacefiller Virus
I-Overwrite Virus
I-Resident Virus
G-Keylogger Hack
I-SQL Injections
B-Theft of Cookies
N-Distribute Denial of Services
N-Multipartite Virus
O-Boot Sector Virus
G-Fake Wireless Access Points (W.A.P)
B-Polymorphic Virus
G-Denial of Services
N-Browser Hijacker
G-Trojan
G-Virus
O-Watering Hole Attacks
B-Phishing
B-Spacefiller Virus
O-Web Scripting Virus
I-Bait and Switch Hack
B-Macro Virus
O-Hacker
O-Trojan Horses