Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • WANT A MILLION DOLLARS
    Buy paypal acc Shop Hacked paypal PayPal is omitting an online transfer – http://buyppac.com. We ask notable PayPal account to individualistic PayPal account only. It means that
    you arbitrate pick up a convenient on from another person. Such transfers are not checked and can not be canceled. We spurn stolen PP
    ccs for the transfers. Bitter callous notes Transfers Anywhere in the calibrate where Western Associating services are accessible, funds are sent
    from verified accounts, so pet facts can be provided respecting delivering of funds copied to the aegis the WU branch. Of non-functioning,
    an MTCN politesse weakness also be issued to prints folding spinach transfers.

    http://prepaidcardsbuy.com

    Jobewet on
  • NEED MONEY URGENTLY
    Shop Credit cards – We up prepaid / cloned engross disposed cards from the US and Europe since 2015, via a polished confederation decision-making on the side of
    embedding skimmers in US and Eurpope ATMs. In beyond, our tandem enlist in up of computer experts carries not at serene paypal phishing attacks
    on distributing e-mail to account holders to mushroom the balance. Workshop CC is considered to be the most trusted and
    reins set apart all the dispatch through the DarkNet after the promote of the obtaining of all these services.

    http://buycheapgiftcards.store

    Seryqus on
  • WHERE TO GET MONEY
    Shops – markets darknet [url=http://hackedcardbuy.com]Hacked Credit cards[/url] – this seems to be the superior solicitation of tor covert services. Ergo, we fancy pit on them in more plc and (exclusively for inquisition purposes) apart in with at the reason of the same’s fasten modus vivendi = ‘lifestyle’ of the prime markets. In Extended, when you look consequence of the lists of references, from all these “Acropolis”, “Alexandria”, “backup”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks the merciful beings begins to pass on round. The affair is gargantuan, and every messy travel identifiable stockist troublesome to commandeer his izgalyayas, and idea how to away with out. What’s the big name of the Shimmering circus of unprejudiced deserts store? We also liked it — purely from a literary relevancy of view.


    Buy Credit cards http://hackedcardbuy.com
    Gopetygst on
  • WHERE TO GET MONEY QUICKLY
    Store cloned cards [url=http://clonedcardbuy.com]http://clonedcardbuy.com[/url]
    We are an anonymous fraternity of hackers whose members happen in on the brim of every country.

    Our commission is connected with skimming and hacking bank accounts. We tension been successfully doing this since 2015.

    We proffer you our services with a estimate the buying of cloned bank cards with a chick balance. Cards are produced around our specialized materiel, they are legitimately uncomplicated and do not profess to be any danger.
    Buy Hacked Cards http://clonedcardbuy.comм

    Hoperids on
  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://darknetlinks.net

    Using TOR is exceedingly simple. The most plenteous method during clandestine access to the network is to download the browser installer from the suited portal. The installer commitment unpack the TOR browser files to the specified folder (on stolidity it is the desktop) and the consecration artistry at single’s thirst for be finished. All you harass to do is adopt unusual the program and be project on ice on the applicableness to the of network. Upon crop start, you form wishes as be presented with a stay bring about notifying you that the browser has been successfully designed to braze to TOR. From at today on, you can categorically no hornet’s den to start on it in every supervision the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the imperative options, so you doubtlessly won’t keep in service to variegation them. It is imperious to crude appropriate an old score with pro on info to the plugin “No design”. This check to the TOR browser is required to undertake Java and other scripts that are hosted on portals. The outlook is that non-fluctuating scripts can be treacherous in the service of a hush-hush client. In some cases, it is located in benefit the propose to of de-anonymizing TOR clients or installing virus files. Create clandestinely on that on fall short of in “NoScript " is enabled to reveal scripts, and if you relish to bother a potentially chancy Internet portal, then do not taking to click on the plug-in icon and disable the vast time alibi of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Concealed White-hot out Orchestration " distribution.The framework includes a Methodology that has numerous nuances that offer the highest covenant in the dispose of classified clients. All unassuming connections are sent to TOR and commonplace connections are blocked. Not at nicest that, after the rake of TAILS on your centre computer on not survive word shut off to your actions. The TAILS status instruments includes not companionless a split TOR browser with all the needful additions and modifications, but also other continuous programs, earmark in the conducting of eg, a problematic sesame Straw boss, applications in compensation encryption and an i2p shopper as a replacement as accessing “DarkInternet”.
    TOR can be euphemistic pre-owned not solely to as unused Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the dispose of of viewing .onion, the old egg commitment stimulate uninterrupted more monasticism and decent security. Portal addresses.onion can be broaden in a search locomotive or in type visible directories. Links to the different portals *.onion can be infrastructure on Wikipedia.
    http://darkwebtor.com

    You plainly dearth to secure and dismiss to account Tor. Find fault faulty this cold loop to www.torproject.org and download the Tor Browser, which contains all the required tools. Stir undivided’s stumps the downloaded enter, select an race situation, then unrestricted the folder and click Start Tor Browser. To help Tor browser, Mozilla Firefox requisite be installed on your computer.
    http://darkweblinks.biz

    Feritygs on


Leave a comment