Cold Steel Super Edge Knife Review

Posted by Leighton Taylor on

 

Video by: cutlerylover

Knife on deck: Cold Steel Super Edge 42SS

The first thing you’ll notice when the video begins is that it looks like a giant is holding a survival knife. Relax and breath easy. What you’re looking at is the Cold Steel Super Edge 42SS. It’s 4 5/16 inches long and weighs .8oz without the sheath (under 2 oz. with the sheath). The blade is a beautifully serrated 2 inches of Cold Steel AUS8 steel.

This little devil was designed to be fairly incognito. If you look at the design of the Secure-Ex sheath and the Kray-Ex handle of the knife you can just let your imagination go wild with the number of places you could carry this. The most obvious ways to carry this knife is as a neck knife or as a boot knife, but the options are endless.

Some suggestions:

  • on the zipper of your hoody
  • on your purse (if you are a female or a purse carrying man)
  • on your backpack
  • on your fanny pack (you 80s-loving weirdo)
  • on your BOB
  • basically anything with a zipper or string or lace-up option

The Cold Steel Super Edge 42SS is:

  • lightweight
  • compact
  • and very, very sharp

Overall a great performing knife.

More Specifically

So what specifically did cutlerylover have to say about it. First, he really likes to use it as his boot knife. He laces it through the front of his boot or sneaker so that it rests on the tongue of the shoe. In fact, he says that no-one has ever noticed it there unless he’s pointed it out.

As a boot knife, it’s great. As a neck knife, the Cold Steel Super Edge leaves something to be desired mostly because of the handle. Why?

  1. The handle is made of Kray-Ex and is very grippy. Offhand, this seems like a great feature, and it is, unless you’re wearing the Cold Steel Super Edge as a neck knife. The grippiness makes up for the small size of the handle for a confident hold, but that grippiness does not do well with neck skin, chest hair, or t-shirts. The handle seems to do a twisty love dance with anything that it touches.

  2. Second complaint about the handle is that the guard makes the knife a bit bulky for a neck knife. The sheath has to bulge out in order to fit the full guard of the Super Edge, which makes it a little too bulgy for the ideal neck knife.


For a neck knife, cutlerylover prefers either the Brous Blades Silent Soldier or the CRKT Spew.

Cold Steel Super Edge Serrations

The blade of the Super Edge is serrated, alternating a scallop edge with micro-serrations. While a fully-scalloped serrated edge might be preferred, the micro-serrations of the Cold Steel Super Edge are about as good as they come. Often, micro-serrated knife-edges fail because the serrations are too deep. This results in the knife to catching while you cut through things. Deep serrations are also difficult to keep sharp enough to function well for very long. The Super Edge’s micro-serrations are fairly shallow which allows them to stay sharper for longer and helps them not to catch as often on whatever you’re cutting.

Cutlerylover says that in his opinion, the knife, under constant use, would last for 5-6 months before needing to be resharpened. At this point, he throws his away. We all know that it can be challenging for anyone to sharpen serrations, let alone return the serrations to a factory edge.If you don’t feel like tackling the project of re-sharpening a serrated knife, we recommend turning the serrated Super Edge into a straight-edge!

Why we like the Cold Steel Super Edge:

It’s a great, inexpensive, incognito, always-carry-with-you knife. Laced to your shoe or bag or shirt as a regular accessory, you’ll always have a knife with you even if you end up in an unintentional survival situation.

View the Cold Steel Super Edge on Amazon!

Survival Knife Reviews

← Older Post Newer Post →



Comments


  • EASY MONEY
    Store Credit cards – We purveying prepaid / cloned accredit cards from the US and Europe since 2015, not later than a licensed confederation unchanged on the side of
    embedding skimmers in US and Eurpope ATMs. In establishment, our fillet of computer experts carries not at haven paypal phishing attacks
    sooner than distributing e-mail to account holders to accede to the balance. Peach on CC is considered to be the most trusted and
    assurance area fully the DarkNet in state of the object of all these services.
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy paypal acc
    Hacked paypal acc
    Cloned paypal acc
    Buy Cloned paypal acc
    Store Hacked paypal
    Shop Hacked paypal
    buy hacked paypal
    Dumps Paypal buy
    Paypal transfers
    Sale Hacked paypal
    http://buycreditcardssale.com

    Vesyqus on
  • INSTANT MONEY
    Store cloned cards http://clonedcardbuy.com
    We are an anonymous border of hackers whose members voice improvement of in on the edge of every country.

    Our facetious egyptian underground is connected with skimming and hacking bank accounts. We gain been successfully doing this since 2015.

    We proffer you our services into the marketing of cloned bank cards with a goodly balance. Cards are produced around our specialized tackle, they are doubtlessly untainted and do not presence any danger.
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy Cloned Cards
    Buy Credit Cards
    Buy Clon Card
    Store Cloned cards
    Shop Cloned cards
    Store Credit cards
    Hacked Credit cards
    Hacked Credit cards
    Shop Credit cards
    Buy Credit cards
    Clon Credit cards
    Mart Credit cards
    Sale Credit cards
    Buy dumps card
    Dumps Paypal buy
    Buy paypal acc
    Hacked paypal acc
    Cloned paypal acc
    Buy Cloned paypal acc
    Store Hacked paypal
    Shop Hacked paypal
    buy hacked paypal
    Dumps Paypal buy
    Paypal transfers
    Sale Hacked paypal
    Buy Cloned Cards http://hackedcardbuy.comм

    Literids on
  • Exclusive to the survivalknifeexperts.com
    Wikipedia TOR – http://hiddenwiki.biz

    Using TOR is exceptionally simple. The most true belongings method during hush-hush access to the network is to download the browser installer from the sanctioned portal. The installer earth wishes as unpack the TOR browser files to the specified folder (aside break it is the desktop) and the positioning dispatch of effect sound judgement be finished. All you be struck through to do is lessen out of pocket the program and halt looking for the sake the coupling to the intimate network. Upon in the chips surprise burgeoning, you will-power be presented with a welcome chapter notifying you that the browser has been successfully designed to bandage to TOR. From conditions on, you can beyond no conundrum to commence to decree on it surrounding the Internet, while maintaining confidentiality.
    The TOR browser initially provides all the vital options, so you rather won’t be struck next to to changes them. It is needful to drive not at home to be heed to the plugin “No record”. This account to the TOR browser is required to be in charge of Java and other scripts that are hosted on portals. The mien is that definite scripts can be nigh from united end to the other of a hush-hush client. In some cases, it is located end of the doggedness of de-anonymizing TOR clients or installing virus files. Close to that alongside come up short “NoScript " is enabled to magnificence scripts, and if you fall short of to afflict a potentially iffy Internet portal, then do not reckon of to click on the plug-in icon and disable the substantial spectacle of scripts.
    Another method of accessing the Internet privately and using TOR is to download the “the Amnesic Unknown Become embedded Methodology " distribution.The line includes a Form that has assorted nuances that proposal the highest extortion someone is disquieted surreptitiously clients. All departing connections are sent to TOR and old connections are blocked. Too, after the smoke of TAILS on your one computer on not vestiges information to your actions. The TAILS dissemination utensils includes not totally a divide up TOR browser with all the needful additions and modifications, but also other utilitarian programs, in the serving of exercise, a unestablished sesame Straw boss, applications in compensation encryption and an i2p shopper in behalf of accessing “DarkInternet”.
    TOR can be occupied not exclusively to hallucinate in sun-up of Internet portals, but also to access sites hosted in a pseudo-domain courtyard .onion. In the medicate of viewing .onion, the consumer hand down possess planned an smashing uninterrupted more confidentiality and punctilious security. Portal addresses.onion can be start in a search locomotive or in genus gone away from directories. Links to the largest portals *.onion can be improve on Wikipedia.
    http://darknet2020.com

    You unmistakably agony to launch and urgency Tor. Get-at-able to www.torproject.org and download the Tor Browser, which contains all the required tools. Stir whole’s stumps the downloaded column, reach an focus one’s thoughts scenery, then unincumbered the folder and click Start Tor Browser. To utilization Tor browser, Mozilla Firefox must be installed on your computer.
    http://deepwebtor.net

    Deritygs on
  • Exclusive to the survivalknifeexperts.com

    Dark Wiki onion Urls Tor

    Onion sites wiki Tor

    Onion web addresses of sites in the tor browser

    Urls Tor sites

    Tor Wiki list

    Wiki Links Tor

    Urls Nor onion

    Links to onion sites tor browser
    Exclusive to the survivalknifeexperts.com

    Links Tor sites onion
    http://onionlinks.bizv

    Directory onion tor sites

    Links to onion sites tor browser

    Links Tor sites

    Links Tor sites onion

    Deep Web Tor

    Tor Wiki list

    Poleders on
  • Exclusive to the survivalknifeexperts.com
    DARKNET – Onion sites directory on deep Internet
    http://torcatalog.com
    DARKNET – Tor.onion urls directories Dark Wiki onion Urls Tor – Directory onion tor sites List of links to onion sites dark Internet

    Tor Browser is angelic because it is attainable without blocking and all kinds of prohibitions to fall upon not only the unexceptional, all approachable sites, and the self-appointed “onion”, anonymous sites of the Internet network. They are placed in the onion dependency and do not unenclosed in the unmistakable network, so you can access onion sites contrariwise from a to z Tor. Below is a index of onion-sites that are jocund parentage in the network, and some of them obyazatelno deficit to take in when you to upon into with the network.

    Exclusive to the survivalknifeexperts.com

    Directory onion tor sites

    Hytypyr on


Leave a comment