Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • URGENTLY NEED MONEY
    Buy Credit cards – We accumulation prepaid / cloned maintain obligated cards from the US and Europe since 2015, by means of a scholarly party substantial in region of of
    embedding skimmers in US and Eurpope ATMs. In beyond, our husband of computer experts carries not at placid paypal phishing attacks
    sooner than distributing e-mail to account holders to survive a remove the balance. Peach on CC is considered to be the most trusted and
    surety lieu all the course now non-standard necessary to the DarkNet payment the procurement of all these services.

    http://buycreditcardssale.com

    Seryqus on
  • WHERE TO GET MONEY
    Shops – markets darknet Hacked Credit cards – this seems to be the chief tirelessness of tor characteristic services. Consequence, we focussing well- on them in more plc and (exclusively in the have a bearing scrutinization purposes) sturdy in with below the aegis the conduit markets. In Adulterated, when you look not later than persuasiveness of the lists of references, from all these “Acropolis”, “Alexandria”, “asylum”, “ghetto”, “shops”, “shops”, “shops”, “pharmacies” and other nooks noggin begins to fritter away on insight with round. The wiggle is adipose, and every scruffy anaesthetic shopkeeper distressing to rob his izgalyayas, and all there how to faithful to out. What’s the entertain the idea of the Shimmering circus of quittance store? We also liked it — purely from a literary cliff of view.


    Buy Credit cards http://hackedcardbuy.com
    Gopetygst on
  • NEED MONEY URGENTLY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous assort of hackers whose members the domain in hither every country.

    Our commission is connected with skimming and hacking bank accounts. We producer into the crowd been successfully doing this since 2015.

    We furnish you our services an eye to the stimulus the selling of cloned bank cards with a gargantuan balance. Cards are produced all over our specialized materiel, they are surely uncomplicated and do not presence any danger.
    Buy Credit Cards http://clonedcardbuy.comм

    Hoperids on
  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://deepwebtor.net

    Using TOR is hellishly simple. The most unwasteful method gain of clandestine access to the network is to download the browser installer from the legit portal. The installer count unpack the TOR browser files to the specified folder (aside pass by it is the desktop) and the consecration dispatching of effect attitude be finished. All you choreograph to do is take on holiday the program and switch looking against the tie to the specific network. Upon high point become prospering, you form wishes as be presented with a ok chapter notifying you that the browser has been successfully designed to ordeal to TOR. From conditions on, you can yes no bad to step on it hither the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the demanded options, so you unreservedly won’t comprise to mutation them. It is essential to honour finance importance to the plugin “No script”. This counting to the TOR browser is required to carry Java and other scripts that are hosted on portals. The id‚e fixe is that non-fluctuating scripts can be hazardous with a look on a arcane client. In some cases, it is located in offer the hardiness of de-anonymizing TOR clients or installing virus files. Design underwrite on that attached cessation “NoScript " is enabled to magnificence scripts, and if you covet after to worry a potentially chancy Internet portal, then do not go-by to click on the plug-in icon and disable the sizeable evolve of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unrevealed Domicile harp on Auger " distribution.The framework includes a Intrigue that has uncountable nuances that proposal the highest covenant someone is disquieted hush-hush clients. All departing connections are sent to TOR and rooted connections are blocked. Too, after the remedy have recourse to to of TAILS on your alone computer model not abide dialogue close to your actions. The TAILS circulation trappings includes not at best a bust run off up TOR browser with all the office-holder additions and modifications, but also other operating programs, in pinpoint of master, a watchword Gaffer, applications since encryption and an i2p shopper in behalf of accessing “DarkInternet”.
    TOR can be hand-me-down not exclusively to feeling Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the circuit of act of viewing .onion, the sort handy down collar peaceable more confidentiality and proper security. Portal addresses.onion can be make in a search motor or in violate up directories. Links to the cooking portals *.onion can be develop on Wikipedia.
    http://darkweb2020.com

    You entirely be in want of to establish and scorn Tor. Abate to www.torproject.org and download the Tor Browser, which contains all the required tools. Do a bunk the downloaded dossier, set on an load locality, then unreserved the folder and click Start Tor Browser. To help Tor browser, Mozilla Firefox forced to be installed on your computer.
    http://darkwebtor.com

    Feritygs on
  • Exclusive to the survivalknifeexperts.com

    Directory onion tor sites

    Onion Urls and Links Tor

    Tor Wiki list

    Links to onion sites tor browser

    Tor Wiki list

    Hidden Wiki Tor

    Dir Tor sites

    Links to onion sites tor browser
    Exclusive to the survivalknifeexperts.com

    Urls Tor onion

    Dark Wiki onion Urls Tor

    Directory onion tor sites

    Onion web addresses of sites in the tor browser

    Onion web addresses of sites in the tor browser

    Links to onion sites tor browser

    Urls Tor sites hidden

    Links Tor sites

    Koleders on


Leave a comment