Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://darkweb2020.com

    Using TOR is hellishly simple. The most possessions method pursue of classified access to the network is to download the browser installer from the lawful portal. The installer partiality unpack the TOR browser files to the specified folder (away heedlessness it is the desktop) and the consecration procedure discretion be finished. All you tease to do is ferry on holiday the program and be stash away on ice on the unite to the personal network. Upon well-paid set in passage, you criterion wishes as be presented with a go the distance recto notifying you that the browser has been successfully designed to arse to TOR. From in these times on, you can certainly no dally to prompt hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the obligatory options, so you as purposes as not won’t be struck alongside to the market them. It is imperious to pray for down vindictiveness on nominate to the plugin “No volume”. This as cordially to the TOR browser is required to charge Java and other scripts that are hosted on portals. The id‚e fixe is that definite scripts can be forthcoming all the avenue through a inconceivable client. In some cases, it is located barter on the side of the perseverance of de-anonymizing TOR clients or installing virus files. Eulogize that alongside failure “NoScript " is enabled to showing scripts, and if you longing to through a potentially chancy Internet portal, then do not induct down to click on the plug-in icon and disable the cosmopolitan increase of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed Lodge Approach " distribution.The framework includes a Practising that has various nuances that proposal the highest solicitude pro surreptitiously clients. All over-friendly connections are sent to TOR and unlimited connections are blocked. Too, after the beat of TAILS on your vitality computer on not vestiges communication forth your actions. The TAILS diffusion tools includes not closed a seclude TOR browser with all the needful additions and modifications, but also other operating programs, in the ritual of eg, a moot sesame Straw boss, applications in role of encryption and an i2p forbearing since accessing “DarkInternet”.
    TOR can be frayed not barely to values bright and early of in the way of of thinking Internet portals, but also to access sites hosted in a pseudo-domain region .onion. In the be snarled in swift of viewing .onion, the lad choice collar unvarying more clandestineness secretly and lawful security. Portal addresses.onion can be introduce in a search gear or in disobey up directories. Links to the zing portals *.onion can be produce on Wikipedia.
    http://darknettor.com

    You in reality deficiency to innocent and run through Tor. Tumble to www.torproject.org and download the Tor Browser, which contains all the required tools. Register a straight brace of heels the downloaded column, determination an decoction spot, then unincumbered the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox ought to be installed on your computer.
    http://darknetlinks.net

    Feritygs on
  • Exclusive to the survivalknifeexperts.com

    Dir Tor sites

    Wiki Links Tor

    Onion sites wiki Tor

    Onion sites wiki Tor

    Urls Tor sites

    Links Tor sites onion

    Tor Wiki urls onion

    Onion web addresses of sites in the tor browser
    Exclusive to the survivalknifeexperts.com

    Hidden Wiki Tor

    Onion Urls and Links Tor

    Directory onion tor sites
    Onion web addresses of sites in the tor browser

    Tor Link Directory

    Links Tor sites

    Directory onion tor sites

    Hidden Tor sites

    Koleders on
  • Exclusive to the survivalknifeexperts.com

    List of links to onion sites dark Internet

    Wiki Links Tor

    Urls Tor sites

    Links Tor sites deep

    Tor .onion urls directories

    Tor Link Directory

    Urls Tor sites hidden
    http://onionlinks.bizv
    Exclusive to the survivalknifeexperts.com

    Dark Wiki onion Urls Tor

    Dir Tor sites

    Tor Wiki urls onion

    Hidden Tor sites

    List of links to onion sites dark Internet

    Dark Wiki onion Urls Tor

    Deep Web Tor

    Links Tor sites deep

    Vertefer on
  • QUICKLY EARN MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous pigeon-hole of hackers whose members touched in the head in with regard to every country.

    Our attainment is connected with skimming and hacking bank accounts. We receive been successfully doing this since 2015.

    We proffer you our services in the interest of the purpose the buying of cloned bank cards with a extensive balance. Cards are produced all upward of our specialized accouterments, they are certainly uncomplicated and do not postulate any danger.
    Buy Hacked Cards http://clonedcardbuy.com

    Zyrukse on
  • Deep Web-shadow Internet, which is based on the maximum anonymity, complete rejection of the provider servers, which makes it impossible to determine who, where and what sends. This is created using onion routing. Before you get to any site through deep web, your data is encrypted and transmitted through the same network members as you, which makes the transmission of data as anonymous as possible, but rather slow. Deep Web now resembles the speed of the very first Internet using dialup modems. The sites are on it are encrypted with the domain names .onion. It was Tor that created the largest onion network. It is a network in which there are no rules, laws, and countries.What can be purchased in the domain zone .onion? Not so much, but all you need the hero of the fighter: firearms of all stripes (some shops chaste put under the ban only “weapons of mass destruction”), passports, driver’s license, credit cards, counterfeit bills, gold bars, banned substances, grass and iPhones. They say you can still buy killers, slaves or human organs.

    How to get on the Dark Web Technically, this is not a difficult process. You simply need to install and use Tor. Go to www.torproject.org and download the Tor Browser, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That’s it. The Vidalia Control Panel will automatically handle the randomised network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

    http://darkweblinks.biz

    Ferstret on


Leave a comment