I'd like some help understanding rebase. The best explanation/rationale I have found so far is the "world conquest" scenario: http://stackoverflow.com/a/5251162/2027089
But ... what I don't understand is what sort of rebase commands were actually done in those examples. Can someone please explain why the hacker's rebase strategy worked, and equally, how I would actually do those rebasings to make things clear? --- Entertaining minecraft videos http://YouTube.com/keybounce -- You received this message because you are subscribed to the Google Groups "Git for human beings" group. To unsubscribe from this group and stop receiving emails from it, send an email to git-users+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.