The first thing to do is to start the ClamVA demon by typing clamd --- After a few moments, control of the command line should return to the user. The next thing we need to do is to update the ClamVA virus database. Use this command: freshclam --- The next stage is to mount the NTFS partition that contains the suspect files. Before we can do that though, we have to figure out how Linux has named the Windows partition. Do this by running GParted via the application launcher.