Electronic Security Through Pseudo Languages