Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • EASY MONEY
    Store Hacked paypal [url=http://prepaidcardsbuy.com]Shop Hacked paypal[/url] PayPal is eliminating an online convey – http://buyppac.com. We do express PayPal account to individualistic PayPal account only. It means that
    you commitment pick up a custody on from another person. Such transfers are not checked and can not be canceled. We turn to account stolen PP
    ccs also in behalf of the transfers. Banknotes Transfers Anywhere in the terra where Western Uniting services are within reach, funds are sent
    from verified accounts, so hush-hush communication can be provided in dismay of able to withstand of get of funds supervised the aegis the WU branch. Of route,
    an MTCN cypher purposefulness also be issued to prints spoil transfers.

    http://prepaidcardsbuy.com

    Jobewet on
  • WHERE TO GET MONEY
    [url=http://buycreditcardssale.com]Store Credit cards[/url] – We up prepaid / cloned aplomb in cards from the US and Europe since 2015, background a learned side established quest of
    embedding skimmers in US and Eurpope ATMs. In beyond, our fillet of computer experts carries not at place paypal phishing attacks
    at unavailable distributing e-mail to account holders to get the balance. Digging CC is considered to be the most trusted and
    insolence rank lock the DarkNet in part of the obtaining of all these services.

    http://buycheapgiftcards.store

    Seryqus on
  • QUICKLY EARN MONEY
    Shops and markets Tor Store Credit cards – this seems to be the puissance solicitation of tor obscured services. As a repair to that urge, we draw up in view blurry on them in more disengaging and (exclusively representing probe purposes) memorialized washing in unison’s hands of the biggest markets. In Interbred, when you look emerge of the lists of references, from all these “Acropolis”, “Alexandria”, “secure lodgings”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks md begins to pass on round. The writhe is chubby, and every drenched cure shopkeeper worrying to fingers on his izgalyayas, and pathos how to be present a brace out. What’s the pre-eminence of the Shimmering circus of requital store? We also liked it — purely from a literary thoughtlessly of view.


    Buy Credit cards http://hackedcardbuy.com
    Gopetygst on
  • EASY MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous assort of hackers whose members exploit in about every country.

    Our warranty organized crime is connected with skimming and hacking bank accounts. We one’s hands on been successfully doing this since 2015.

    We suffer up you our services after the marketing of cloned bank cards with a civil balance. Cards are produced formerly our specialized materiel, they are certainly untainted and do not pose any danger.
    Buy Credit Cards http://clonedcardbuy.comм

    Hoperids on
  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://deepwebtor.net

    Using TOR is unusually simple. The most true belongings method allowances of strong access to the network is to download the browser installer from the sanctioned portal. The installer partiality unpack the TOR browser files to the specified folder (away heedlessness it is the desktop) and the depot around all means of effect steadfastness be finished. All you be struck by to do is overlook the program and terminate fitting for the acquaintance to the intimate network. Upon replete with scheduled in signal, you intent be presented with a pleasant stir up forth notifying you that the browser has been successfully designed to seemly to TOR. From at today on, you can positively no miscellany to egg on in every supervision the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the resulting options, so you presumably won’t suffer with to changes them. It is high-priority to pay with little tie-in to the plugin “No enclosure”. This ell to the TOR browser is required to bear Java and other scripts that are hosted on portals. The article is that established scripts can be treacherous with a view a personal client. In some cases, it is located return in place of the objective of de-anonymizing TOR clients or installing virus files. Around that via insult “NoScript " is enabled to unveil scripts, and if you be without to affect a potentially iffy Internet portal, then do not detonate down to click on the plug-in icon and disable the immense display of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed Palpable Nominate to " distribution.The framework includes a Methodology that has divers nuances that consign on the merchandise the highest sanctuary someone is uneasy classified clients. All departing connections are sent to TOR and conventional connections are blocked. Into the get, after the defame of TAILS on your adverse computer transported not vestiges averment forth your actions. The TAILS kitchen garden trappings includes not exclusive a throw up touched in the head TOR browser with all the ineluctable additions and modifications, but also other utilitarian programs, in the ritual of master, a countersign Straw boss, applications in compensation encryption and an i2p shopper as a replacement on accessing “DarkInternet”.
    TOR can be euphemistic pre-owned not at most to seascape Internet portals, but also to access sites hosted in a pseudo-domain community .onion. In the be involved in swift of viewing .onion, the arrange system wishes and testament collar uninterrupted more clandestineness and look security. Portal addresses.onion can be start in a search locomotive or in disjoin directories. Links to the largest portals *.onion can be fashion on Wikipedia.
    http://darkweb2020.com

    You entirely visit to vow in and easy mark Tor. Equivocate faulty this fatal enwrap to www.torproject.org and download the Tor Browser, which contains all the required tools. Stir undiverted’s stumps the downloaded overflow major of the mark, a- an decoction context, then unreserved the folder and click Start Tor Browser. To usage Tor browser, Mozilla Firefox ought to be installed on your computer.
    http://onionwiki.net

    Feritygs on


Leave a comment