Tech Nottingham August 2018: Secure Signups and Visual Testing

Tech Nottingham
Tech Nottingham
Public group


Beck Street · Nottingham

How to find us

Antenna is on the corner of Beck Street and Huntingdon Street

Location image of event venue


Tech Nottingham has now moved to the second Monday of each month

Full event details:


This month we have two fantastic talks from Viv Richards ( and James Barker. Plus we've got free food and drinks provided at the event thanks to our sponsors Capital One, Cordius, Experian and MHR

Everyone is welcome and there are no tickets required. Just turn up - it's free!


Spot The Difference: Automating Visual Regression Testing
by Viv Richards

In this session we look at why we automate tests, the issue with just manually testing, common end to end automation pitfalls, a brief introduction to visual testing and finally a look at common issues with visual testing and ways to overcome them.

Using interactive examples we will gain an understanding of why relying on just manual testing can become an issue and how too much end to end automation can have a negative impact. The audience will also learn what visual testing is, what tools are available, some of the common pitfalls of using visual testing as well as tips on ways to overcome them.

About Viv

Viv Richards is a senior test automation engineer, a blogger and a community bumble bee. In his spare time he enjoys teaching children to code as a CodeClub volunteer as well as bringing communities together to share skills and knowledge by organising local meet-up’s as well as organising South Wales largest agile and developer conference.


Security Sins Of The Sign-Up Process

by James Barker

The sign-up process is one of the earliest interactions a user will have with a website. There is a lot of pressure to increase the effectiveness of this process by requiring minimal clicks, the fewest key strokes and being as simplistic as possible.

However usability and security often have conflicting requirements and leaning too far towards usability can lead to vulnerabilities...

In this talk we will take a look at seven examples of what not to do during the user sign up process. Each example leads to a vulnerability that could be exploited later on and explores why it occurred and how it could have been avoided.

This isn't a technical deep dive into the security aspects of software development. Instead it focuses on how the design stage can lead to vulnerabilities and aims to show where neglecting security over user experience or not fully understanding requirements is just as insecure as badly written software.

About James

James Barker's programming adventures started out when he was 11, when he spent most of his time tinkering with DarkBasic games. Since the early days he's had a keen interest in how computers are hacked - and realised early on that hacking can be thought of as finding "alternative and unexpected" ways of using someone else's software.

Throughout his career he's worked with many web apps and APIs and secretly enjoyed finding and fixing vulnerabilities in them. As a huge advocate of fully automated test suites, James is currently working as an automation engineer at Capital One.


Full event details: