LizS got their new logo design by running a design contest:
Computer Jacker needs a new logo
Check out LizS's Logo design contest…
We provide free video & ebook tutorials, resources, and tools for people who want to build their own specialty computer.
Logo types to explore
The logo should, of course, be representative of the Computer Jacker Brand, which basically represents the right for anyone to have a quality high performance computer as unique as they are without paying a fortune. In terms of any of the requirements above, feel free to ignore them if you think you have something better in mind. Or instance, I can't say with 100% certainty that orange is the best color...that's why I'm not designing this myself.
US$299 Bronze package
Every design category has flexible pricing for all budgets. Logo design starts at $429.
Full copyright with production-ready files for digital and/or print.
It all began with a design brief.
A quick, interactive guide helped them understand their design style and captured exactly what they needed in their logo design.
Designers across the globe delivered design magic.
LizS collaborated with designers to refine their ideas
When design entries come in, you can rate them so designers know what you’re looking for in your logo design.
99designs has great collaboration tools so you can pinpoint and capture your ideas
And then… they selected a winner!
Along the way, they met lots of talented designers…
We think contests are a super fun way to get design.
Recently completed contests:
business management software for healthcare
We are an agency that offers web and mobile app development, graphic design and marketing services.
HackITPro is an online platform that gives IT professionals the ability to test their network penetration skills in a si
We're a research center for information security. On the one hand, we do applied information security research, and on t
We sell cost estimating software and services to construction companies in the United States.
A computer security conference focused on the technical aspects of cyber security. Target audience is computer security