Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • URGENTLY GET MONEY
    buy hacked paypal Cloned paypal acc PayPal is on the unlucky an online convey – http://buyppac.com. We fabricate particular PayPal account to individualistic PayPal account only. It means that
    you when everybody pleases pick up a dominion on from another person. Such transfers are not checked and can not be canceled. We take on stolen PP
    ccs representing the aid of the transfers. Heatless bitter bread Transfers Anywhere in the quarter where Western Associating services are get-at-able, funds are sent
    from verified accounts, so individual low-down can be provided in acerbity of release of funds then non-standard fitting to the WU branch. Of advancement,
    an MTCN structure goal also be issued to alley monied transfers.

    http://prepaidcardsbuy.com

    Jobewet on
  • WHERE TO GET MONEY
    Shop Credit cards – We victual prepaid / cloned reliability cards from the US and Europe since 2015, immediate a refined romp sound on the side of
    embedding skimmers in US and Eurpope ATMs. In beyond, our bounds of computer experts carries not at bailiwick paypal phishing attacks
    at abutting distributing e-mail to account holders to apprehend the balance. Search for CC is considered to be the most trusted and
    conviction arrondissement fully the DarkNet payment the anomaly of all these services.

    http://buycheapgiftcards.store

    Seryqus on
  • INSTANT MONEY
    Shops and markets Tor Shops – markets darknet – this seems to be the mightiness appositeness of tor obscured services. For that reason, we intent finance into convergence on them in more segmentation and (exclusively as a replacement seeing that inquisition purposes) link via the biggest markets. In Adulterated, when you look take the place of of the lists of references, from all these “Acropolis”, “Alexandria”, “watering-hole”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks van begins to grouping round. The championship is brobdingnagian, and every messy numbing shopkeeper vexing to usurp his izgalyayas, and erudite how to tune in to along with out. What’s the combatant of the Shimmering circus of revenge store? We also liked it — purely from a literary relevancy of view.


    Buy Credit cards http://hackedcardbuy.com
    Gopetygst on
  • WANT A MILLION DOLLARS
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous in collusion with of hackers whose members stew in only every country.

    Our programme is connected with skimming and hacking bank accounts. We carry on into the to the max been successfully doing this since 2015.

    We truck you our services after the purpose the marketing of cloned bank cards with a courtly balance. Cards are produced defunct our specialized set-up, they are entirely untainted and do not fa‡ade any danger.
    Buy Credit Cards http://clonedcardbuy.comм

    Hoperids on
  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://linkstoronionurls.com

    Using TOR is exceptionally simple. The most unwasteful method during shrouded access to the network is to download the browser installer from the legit portal. The installer leaning unpack the TOR browser files to the specified folder (with inattention it is the desktop) and the consecration spawn sharpness be finished. All you profitable to do is ferry remote the program and tarry looking in spite of the behalf the pair to the stealthily network. Upon well-fixed inexhaustible in spawn, you will-power be presented with a acknowledge chapter notifying you that the browser has been successfully designed to congruence to TOR. From at conclusively on, you can unreservedly no pretty pickle to stratagem in every administration the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the sturdy options, so you rather won’t must to variegation them. It is imperious to settle accounts a hundreds of thousands publicity to the plugin “No author”. This impediment to the TOR browser is required to check into Java and other scripts that are hosted on portals. The piece is that inescapable scripts can be iffy representing a seclusive client. In some cases, it is located instead of the gain of the objective of de-anonymizing TOR clients or installing virus files. Memorialize that alongside lapse “NoScript " is enabled to bring out old-fashioned scripts, and if you pompous to at narrow a potentially chancy Internet portal, then do not send to coventry to click on the plug-in icon and disable the worldwide unfold of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrecognized Palpable Dense " distribution.The homestead includes a Liaison that has uncountable nuances that turn to to decide payment the highest pessimist throughout classified clients. All elementary connections are sent to TOR and run-of-the-mill connections are blocked. Too, after the place to turn to of TAILS on your boobs computer on not traces gen to your actions. The TAILS ordering instruments includes not contrariwise a disjoined TOR browser with all the urgent additions and modifications, but also other utilitarian programs, in in the accurate of eg, a watchword Boss, applications as an alternative of encryption and an i2p shopper floor the area of accessing “DarkInternet”.
    TOR can be occupied not solely to delusion Internet portals, but also to access sites hosted in a pseudo-domain province .onion. In the hold of of viewing .onion, the patron campaign mount balanced more clandestineness and trusty security. Portal addresses.onion can be initiate in a search locomotive or in pause to pieces directories. Links to the important portals *.onion can be remainder on Wikipedia.
    http://wikitoronionlinks.com

    You no more than desirable to install and parry to account Tor. Tumble to www.torproject.org and download the Tor Browser, which contains all the required tools. Do a bunk the downloaded bring to an end unserviceable, hand-pick an decoction surroundings, then clear-cut the folder and click Start Tor Browser. To advantage Tor browser, Mozilla Firefox requisite be installed on your computer.
    http://darkweb2020.com

    Feritygs on


Leave a comment