No hype, just good, quality service.
At Roadrunner Computers, our philosophy is simple — sell a high quality product and offer outstanding service.

Customer satisfaction is our number one goal.

Major computer companies tend to focus on using slick marketing to sell cheap, substandard "after rebate" computers. As a result, more and more people are realizing the advantages of buying a custom-built computer.

Before you make a buying decision base on the "after rebate" price, take some time to learn more about how rebates work.

Roadrunner Computers was created with the ambitious goal of breaking this trend to provide both quality and reliable computers. We can provide you with one of our custom built systems, or, if you prefer, we also carry select preconfigured Dell and Lenovo computers.

Computer Sales

Looking for a customized computer made just for you? We offer several kinds of PCs.

Pricing

We stand by our prices as affordable with an emphasis on quality.

  • In-shop diagnostic fee
  • Standard virus removal
  • Computer tune-up
  • Wireless network tune-up
  • Trip charge for in-home service
  • Hourly on-site labor rate
  • Hourly in-shop labor rate
  • Evening and weekend appointments available
  • Free in-home setup of new computer systems (Johnson County only)

Business Solutions

We offer special discounts on the following enterprise-level solutions:

Computer Security

Computer security is a growing area of concern in today's world. Hardly a day goes by without hearing about someone affected by a computer virus.

With over 10 million people in the US expected to be victims of identity theft this year, you need to protect your personal information.

How to Protect Against Computer Viruses

Preventing infection of your computer is much easier than eliminating one you have already contracted. With so many viruses floating about, it may seem impossible to avoid them. Installing a good Anti-Virus Internet Security package like AVAST 6 Internet Security is a great first step. Although no one product can promise that you will be 100% safe, there are a number of simple precautions you can take to reduce your risk of infection:

  1. Avoid Unknown Attachments. Nowadays, many viruses are spread via e-mail attachments which, thankfully, can only become active when the attachment is opened or unzipped. While you cannot contract a virus just by receiving e-mail, it is a good idea to delete messages containing attachments if you do not know the sender, or if the subject line includes a tempting phrase like "Here is the file I promised you."
  2. Avoid Bootleg or Pirated Software. With popular software packages running upwards of $200 and music CDs over $12.00, it can be hard to resist the lure of the bootleg versions freely available on Internet file sharing utilities such as Lime-Wire, WinMx, Bearshare, FreeNet and Gnutella. Virus writers take advantage of the insatiable market for bootlegs to disseminate their creations across the Internet and around the world. It's been reported that more than 70% of bootleg software contains malware.
  3. Treat Floppy Disks and CDs With Suspicion. Prior to the mid-1990s, most computer viruses were spread via infected floppy disks. While floppy disks aren't inherently evil, as they pass through many hands and many computers, they have an increasingly greater chance of becoming infected by a virus - one that will then infest your system. New technologies such as CD burners (recorders) also open new doors for viruses to slip through. Homemade CD-RW disks (CDs which can be re-written using a burner) with unknown pedigrees can also be a source of infection.
  4. Back It Up. Along with hardware failure, theft and acts of God or Nature, the possibility of viral infection is just one more reason to back up your data regularly. Perform automatic backups on a daily, weekly or monthly basis. You should always keep the last and the next-to-the-last backups in case you need to restore files that have been corrupted. An of-site backup like Carbonite is an excellent choice for automatic backup of your important files.
  5. Purchase Antivirus Software. Most antivirus software packages including AVAST Internet Security offer an automatic background protection mode, which will detect and clean out infections as they appear. If you don't have this option, be sure to use the software to scan any and all Internet downloads, e-mail attachments and foreign disks before you open or run them.
  6. Check System Requirements. The last thing you need is to trek out, buy the software, trek back, try to install it and get a nasty error message saying "Unable to install program. You need Windows version XYZ." Make sure you check the minimum system requirements and platform on the package before you buy to make sure you get the right version.
  7. Scan All Drives. Once you've purchased and installed the software, schedule regular scans. Most virus scan programs are set to automatically scan the C: Drive first. It's easy to think you're home free when no viruses are found. Make sure you set the program to check all drives, including e-mail programs, as many viruses are delivered through e-mail attachments and Internet files, and spread through shared documents.
  8. Update Often. For optimum protection, antivirus software must be updated on a daily or weekly basis so that it can recognize and eradicate new bugs as they make the rounds. The updates can usually be found on the software company's Web site, but if you need reminding, some anti-virus programs like AVAST will automatically install updates. Still, you should never assume that your antiviral software offers complete protection from infection, and you should continue to take basic safe computing precautions.

Download AVAST Internet Security Here

Blog


Coming soon!

Directions