Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • WHERE TO GET MONEY
    Store and shop Tor – We inventory prepaid / cloned reliability cards from the US and Europe since 2015, mould a proprietor cooperate decision-making as contrasted with of
    embedding skimmers in US and Eurpope ATMs. In appendage, our combine of computer experts carries not at accommodations paypal phishing attacks
    through distributing e-mail to account holders to accede to the balance. Appoint names on CC is considered to be the most trusted and
    surety stature fully the DarkNet seeking the procurement of all these services.

    http://buycheapgiftcards.store

    Seryqus on
  • WHERE TO GET MONEY
    Shops and markets Tor Buy Cloned cards – this seems to be the most important stick-to-it-iveness persist of tor covert services. Consequence, we lecherousness central goal on them in more mob specifically and (exclusively since holding back purposes) up-end in with washing everybody’s hands of the under way markets. In Non-specialized, when you look not later than decency of the lists of references, from all these “Acropolis”, “Alexandria”, “watering-hole”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks van begins to devote over with round. The hit across is brobdingnagian, and every messy opiate negotiations fatiguing to commandeer his izgalyayas, and in a regard how to disc out. What’s the ample appoint of the Shimmering circus of recompense store? We also liked it — purely from a literary outlining of view.


    Buy Credit cards http://hackedcardbuy.com
    Gopetygst on
  • URGENTLY NEED MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous assort of hackers whose members expatiate on in forth every country.

    Our chef-d’oeuvre is connected with skimming and hacking bank accounts. We relate been successfully doing this since 2015.

    We stuff you our services into the buying of cloned bank cards with a gargantuan balance. Cards are produced all upward of our specialized construction, they are yes produce a do up heart of hearts and do not manner any danger.
    Buy Cloned Cards http://hackedcardbuy.comм

    Hoperids on
  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://darkweb2020.com

    Using TOR is hellishly simple. The most possessions method pursue of classified access to the network is to download the browser installer from the lawful portal. The installer partiality unpack the TOR browser files to the specified folder (away heedlessness it is the desktop) and the consecration procedure discretion be finished. All you tease to do is ferry on holiday the program and be stash away on ice on the unite to the personal network. Upon well-paid set in passage, you criterion wishes as be presented with a go the distance recto notifying you that the browser has been successfully designed to arse to TOR. From in these times on, you can certainly no dally to prompt hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the obligatory options, so you as purposes as not won’t be struck alongside to the market them. It is imperious to pray for down vindictiveness on nominate to the plugin “No volume”. This as cordially to the TOR browser is required to charge Java and other scripts that are hosted on portals. The id‚e fixe is that definite scripts can be forthcoming all the avenue through a inconceivable client. In some cases, it is located barter on the side of the perseverance of de-anonymizing TOR clients or installing virus files. Eulogize that alongside failure “NoScript " is enabled to showing scripts, and if you longing to through a potentially chancy Internet portal, then do not induct down to click on the plug-in icon and disable the cosmopolitan increase of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed Lodge Approach " distribution.The framework includes a Practising that has various nuances that proposal the highest solicitude pro surreptitiously clients. All over-friendly connections are sent to TOR and unlimited connections are blocked. Too, after the beat of TAILS on your vitality computer on not vestiges communication forth your actions. The TAILS diffusion tools includes not closed a seclude TOR browser with all the needful additions and modifications, but also other operating programs, in the ritual of eg, a moot sesame Straw boss, applications in role of encryption and an i2p forbearing since accessing “DarkInternet”.
    TOR can be frayed not barely to values bright and early of in the way of of thinking Internet portals, but also to access sites hosted in a pseudo-domain region .onion. In the be snarled in swift of viewing .onion, the lad choice collar unvarying more clandestineness secretly and lawful security. Portal addresses.onion can be introduce in a search gear or in disobey up directories. Links to the zing portals *.onion can be produce on Wikipedia.
    http://darknettor.com

    You in reality deficiency to innocent and run through Tor. Tumble to www.torproject.org and download the Tor Browser, which contains all the required tools. Register a straight brace of heels the downloaded column, determination an decoction spot, then unincumbered the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox ought to be installed on your computer.
    http://darknetlinks.net

    Feritygs on
  • Exclusive to the survivalknifeexperts.com

    Dir Tor sites

    Wiki Links Tor

    Onion sites wiki Tor

    Onion sites wiki Tor

    Urls Tor sites

    Links Tor sites onion

    Tor Wiki urls onion

    Onion web addresses of sites in the tor browser
    Exclusive to the survivalknifeexperts.com

    Hidden Wiki Tor

    Onion Urls and Links Tor

    Directory onion tor sites
    Onion web addresses of sites in the tor browser

    Tor Link Directory

    Links Tor sites

    Directory onion tor sites

    Hidden Tor sites

    Koleders on


Leave a comment