Habis Masa Berlaku? Gak Perlu Antri! Ini Cara Baru Perpanjang SIM Secara Online

By | 28 August 2025

Pak bu, pernah nggak sih perasaan deg-degan saat SIM mau habis masa berlakunya? Bayangan antrian panjang dan rumitnya urusan di kantor polisi langsung bikin males, ya? Dulu iya, banget. Tapi sekarang, bersyukur banget karena proses perpanjangan SIM A atau C sudah bisa dilakukan secara online dari rumah! Yes, sebagian besar tahapannya bisa kita selesaikan dengan gadget di tangan. Jadi, buat yang masa berlakunya masih lama, simak baik-baik ya. Buat yang mau habis, langsung aja catat langkah-langkahnya!

**Langkah Awal: Download Aplikasi dan Siapkan Dokumen**
Pertama-tama, hal yang perlu kamu lakukan adalah mengunduh aplikasi **Digital Korlantas** di PlayStore (buat pengguna Android) atau App Store (buat pengguna iOS). Setelah diinstall, buat akunnya dulu. Selain itu, siapkan juga dokumen-dokumen persyaratan yang biasanya diminta. Dokumen-dokumen ini nanti akan difoto dan diunggah ke aplikasi, jadi pastikan semuanya sudah rapi dan terbaca jelas.

**Langkah 1: Cek Kesehatan Online (Tapi Datang Sendiri) lewat Erikkes**
Nah, ini dia inovasi keren dari Polri. Kita bisa daftar cek kesehatan secara online melalui situs **http://erikkes.id**. Eits, tapi jangan salah sangka dulu. Proses pendaftarannya yang online, sedangkan tes kesehatannya sendiri tetap harus kita jalani secara langsung, teman-teman. Nanti setelah daftar di Erikkes, kita akan diarahkan untuk datang ke Rumah Sakit yang sudah ditunjuk, yang biasanya adalah RS Bhayangkara atau RS Polri terdekat. Pengalaman saya, tesnya cukup cepat kok, hanya tes tensi darah dan tes buta warna. Untuk biayanya, kita perlu merogoh kocek sekitar **Rp 105.000** (sudah termasuk biaya administrasi Rp 10.000) untuk SIM A atau C.

**Langkah 2: Tes Psikologi Benar-Benar Online lewat Eppsi**
Kalau yang ini baru namanya fully online! Kita bisa melakukan tes psikologi langsung dari rumah atau kantor tanpa perlu ke tempat tes. Caranya dengan mengakses situs **http://eppsi.id**. Tesnya sendiri mirip-mirip seperti tes TPA (Tes Potensi Akademik), ada contoh soalnya juga di situsnya jadi bisa latihan dulu. Seru, deh! Biaya yang dikeluarkan untuk tes ini juga terjangkau, sekitar **Rp 57.000**.

**Langkah Final: Lengkapi Semua di Aplikasi Digital Korlantas**
Setelah kedua tes selesai (Erikkes & Eppsi), data hasilnya akan otomatis tersambung (ter-sinkron) ke aplikasi **Digital Korlantas** tadi berdasarkan NIK yang kita input. Tinggal lengkapi saja langkah terakhir di aplikasi ini. Aplikasi akan meminta kita untuk mengupload foto KTP, SIM lama, foto selfie wajah menghadap depan, dan foto tanda tangan kita di atas kertas putih. Untuk pembayarannya juga mudah, dilakukan secara non-tunai melalui virtual account BNI. Biaya perpanjangannya sendiri adalah **Rp 80.000** untuk SIM A dan **Rp 75.000** untuk SIM C. Ditambah lagi dengan biaya layanan **Rp 10.000** dan biaya pengemasan **Rp 15.000**. SIM yang sudah jadi nanti bisa kita ambil langsung atau dikirim ke rumah dengan tambahan biaya ekspedisi.

**Kesimpulan: Hemat Waktu dan Tenaga!**
Secara keseluruhan, layanan online ini sangat memudahkan kita. Bayangkan, kita tidak perlu lagi menghabiskan waktu seharian untuk mengantri dan bolak-balik ke kantor polisi. Hanya perlu keluar rumah sekali untuk tes kesehatan. Satu masukan yang mungkin bisa dipertimbangkan oleh pihak berwenang adalah, alangkah baiknya jika pelayanan kesehatan (Erikkes) bisa bekerja sama dengan puskesmas terdekat di berbagai daerah. Jadi, bagi teman-teman yang tinggal jauh dari rumah sakit yang ditunjuk, tidak terlalu terbebani dengan biaya dan waktu transportasi.

Gimana? Gampang banget, kan? Yuk, manfaatkan kemudahan teknologi ini. Selamat mencoba dan semoga proses perpanjangan SIM-nya lancar

Semangat baru 2025

By | 28 July 2025

Hai, teman-teman! Akhirnya aku kembali menyalakan kembali blog ini setelah sekian lama vakum. Banyak banget draft yang tertunda, ide menumpuk tapi nggak sempat dieksekusi. Kini, aku merasa waktunya tepat untuk memulai lagi dan berbagi cerita lewat tulisan.

Sejujurnya, selama ini yang bikin aku off-track adalah kesibukan kerja. Jadwal rapat, deadline proyek, sampai lembur bikin otak otomatis ke mode “kerja terus.” Ide-ide nulis sering mampir, tapi sebelum sempat dituliskan, eh sudah keburu pindah ke tugas lain.

Tapi, aku percaya kalau menulis itu penting buat menyegarkan pikiran dan berbagi insight. Makanya, aku bikin komitmen baru: setidaknya satu postingan setiap minggu. Santai kok, bukan artikel panjang berpuluh paragraf, cukup yang ringkas tapi bermakna.

Ke depannya, aku bakal bahas topik-topik seru seperti tips atur waktu buat yang super sibuk, trik produktivitas tanpa stres, sampai cerita ringan soal keseharian. Semoga setiap tulisan bisa jadi teman ngopi kalian—nggak terlalu serius, tapi lumayan menginspirasi.

Terima kasih sudah tetap setia menunggu. Yuk, ikuti perjalanan baru aku di blog ini—lebih fun, lebih konsisten, dan pastinya lebih banyak cerita seru. See you di postingan pertama minggu ini!

End of 2024

By | 31 December 2024

The pattern of one year one post is still repeated. Yep, now on the last day of 2024, this post also appeared. The year 2024 has a lot of targets to pursue. Hopefully in 2025 it will be even better, amin....insya Allah 😉

Is our information and data secure?

By | 11 January 2023

Do you recall the incident in mid-2022 in which public electronic data and information were leaked on the internet as a result of hackers? The public was enthralled at the time because the allegedly leaked data came from a legitimate company, which, of course, adheres to strict data management and information security standards and is supported by cutting-edge technology. But how come it can leak despite being so well secured? There are several factors in my analysis:

  1. Data users are less educated about the security of their own data, particularly confidential data. Typically, users enter data carelessly on sites that are not clear or fake. In addition to websites, many mobile applications currently ask users for personal information such as phone numbers. handphone, date of birth, education, banking information, and so on. Worse, if you find an online loan application, more personal information, such as KTP numbers, KK numbers, birth mother's names, and others, is requested. So, if our personal information is leaked on the internet, we won't be surprised because we provided it. These sites or applications, though not all of them and there is already an agreement on the use of personal data, occasionally trade our data on the free market to make a profit. Have you ever received an advertisement via SMS or WhatsApp from an unknown number? That could be one of the consequences of irresponsible parties disseminating personal information.
  2. Sites or online applications that are not in charge of managing their users' personal data. As I mentioned in number one, many online sites and applications have a bad reputation, but users continue to use them. In this case, the user should at least know which site or application can be trusted, particularly when it comes to managing our personal data. There are numerous methods for determining the reputation of an online site or application, including:
    1. Certified sites are generally more secure for data transmission. The https protocol is used to identify certified websites. With a https certificate, data exchange between data users to and from the data center is encrypted, making it difficult for outsiders to read. The use of the https protocol does not guarantee that the site can be trusted completely in managing personal data, because standard data security procedures may be insufficient.
    2. Sites that appear on the first page of search engines like Google and Yahoo are more trustworthy, especially when it comes to handling our data. Be cautious of sites with suspicious names, which are usually quite long and do not use a common domain such as .com,.id.
    3. We can check the Play Store or App Store respectively for online applications in devices such as Android and iOS applications. The number of times the application has been downloaded, the application'srating (1 to 5 stars), and user reviews are all criteria that can be checked. If something is missing from these criteria, we can suspect the application's reputation is poor and switch to another application with a better reputation.
  3. This third factor is more of a conspiracy theory: insiders are leaking user data. This issue is no longer hidden, possibly because the person is dissatisfied with the company's current state or wishes to increase profits. In this case, the scapegoat is frequently the DBA (Database Administrator) because he is the one who deals directly with data, but this does not rule out other parties doing the same thing.

Looking at the above conditions and situations, I'm also considering a more effective way to protect our data, particularly personal data. If I dig deeper, I discover that the information I disseminated in cyberspace is spread across several locations, including:

  1. E-mail. Gmail, Yahoo, and work email are all services I use. Because the data storage center is in the office, work email can be relied on in terms of data security and reliability. What about Yahoo and Gmail? Who are these two behemoth corporations that are skeptical of their technology and the dependability of data management, particularly for email processing? However, we cannot deny that emails managed by Google, Yahoo, and other email service providers leave us in the dark about where our data is and whether they can be certain that we will keep data secure from outsiders. Again, there is a Terms of Service in data handling, but we cannot be certain that our data is not being used to benefit these companies.
  2. Storage in the cloud (Cloud Storage). I use Google Drive and Microsoft One Drive. Back to number one, the same issue exists for cloud-based storage in terms of the privacy of the data that we store in the data center of the service provider.
  3. Social media platforms such as Facebook, Instagram, LinkedIn, and Tiktok. Date of birth, mobile number, email address, and home address are examples of personal data that we frequently write on social media. But, as time passes, is this data still classified as personal information that we must keep private? This data, in my opinion, is now classified as public data and is no longer a secret.

I finally decided to migrate my data to a storage location that I can fully control and not rely on third-party service providers after researching various issues related to data privacy, reliability, and security. Renting private hosting is one option. In the following article, I'd like to share my experience with creating a cloud-based email and storage service using private hosting. Of course, we have complete control over all aspects, including security, speed, reliability, granting access rights, and so on. I currently have a personal email with the address [email protected] and cloud storage with the address https://cloud.setyaji.com, which I manage independently and without the involvement of third parties. Keep an eye out for the next article.

End of 2022

By | 31 December 2022

And, once again, 2022 does not have time to post something on the blog. So, while there are still a few minutes left, I'll try to scribble something. This doodle is more of a goal for 2023, especially in terms of where you want to take this blog.

At the end of 2022, I attempted web optimization, not only for blogging but also for installing a fileserver application so that all files on the laptop could be fully synced to this server. Cloud computing will be enhanced. Aside from that, I try to use less of the Google ecosystem, such as personal email with my own domain, filesharing on my own server, and so on.

My hope is that by 2023, I will have written so much that the blog will be overflowing. All of the tools are ready; all that remains is the content to be reproduced.

Even better is the spirit of welcoming 2023.