your question doesn't make seance..If the question is where do you "get" special teak logs?The answer is by cutting many a lot of teak logs. You can expect to get 0-1 Special Teak Logs per inventory, although this is not guaranteed. It has been proven that it is possible to get more than one special logs in one inventory, or you could be unlucky and get none per inventory.If the question is where do you "take" special teak logs?/ what do you do with them?The answer isSell them to the Sawmill Operator, north-east of Varrock for 1,300gp.Exchange them for a completely free conversion of the logs in your inventory into planks.The free conversion requires 2 of the same type of special log.2 special teak logs can be used to convert up to 26 teak logs into teak planks.2 special mahogany logs can be used to convert up to 26 teak logs and/or mahogany logs into teak/mahogany planks.If you have 1 special or 1 of each, the sawmill owner will only offer to buy your special logs.P.S.It is confirmed that Managing Miscellania will not produce any special logs, as stated by Mod Emilee.
A sawmill
It would take exactly 2555 willow logs.
A timber mill.
I would strongly recommend using diffrent logs if you can but otherwise it probably would take at least maby 2m 1m logs which i have no clue i just like to help people with runescape
Security Logs
I believe it would be the System Logs. No is The Application Logs
System, Security, and ApplicationAnswer Explanation: The Event Viewer tool is used under Windows 2000 computers to check the logs of events that have transpired on those computers. The logs found within the Event Viewer are Security, System, and Application logs. Security logs are written to when audits are attempted, failed, or succeeded. System logs are written to when system events occur. Application logs are written to when applications that are installed on the computer generate errors or when they have been logged through administrative intervention.
Event ID software lets administrators and users view event logs on a local or remote machine. Users can filter event logs by one or more criteria and custom views can be created.
4 logs
Event log managers
The first logs typically checked after an intrusion are the security event logs, firewall logs, and system logs. These logs would provide information on the nature of the intrusion, the affected systems, and potential indicators of compromise that would help in investigating and containing the incident.
Event Viewer (can be opened by Start -->Run --> eventvwr)
Beginning in 2005 federal agencies were required to maintain OSHA 300 logs and report the findings to the Bureau of Labor Statistics.
A scythe? Old runescape Easter event. You can't get one now.
to record details of unit activity before, during, and after an incident
the computer event view logs events of a computer such as shutdowns, start ups , error that are generated by applications and hardware faults