I'd like some help understanding rebase.

The best explanation/rationale I have found so far is the "world conquest" 
scenario:
http://stackoverflow.com/a/5251162/2027089

But ... what I don't understand is what sort of rebase commands were actually 
done in those examples.
Can someone please explain why the hacker's rebase strategy worked, and 
equally, how I would actually do those rebasings to make things clear?

---
Entertaining minecraft videos
http://YouTube.com/keybounce

-- 
You received this message because you are subscribed to the Google Groups "Git 
for human beings" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to git-users+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to