I have figured things out and it's up and running. By the way, Kali Linux is full of a lot of neat aps that are used for legitimate uses such as penetration testing. It can be used by bad guys, but mainly to test the security of systems . No I'm not a hacker, I have several systems in my network...